Pub Date : 2021-11-30DOI: 10.19101/ijacr.2021.1152043
Yasir Minhaj Dubey Animesh Kumar Khan
In this paper k-means clustering algorithm has been used with k-points (KMK) selection. It has been applied on the PIMA Indian diabetes dataset. It has been used for distance estimation, centroid selection, effect of data size variations and for the analysis of the complete record. The cluster section has been found to be improved based on k-point selection. It has been used for the assignment of initial centroid. The results indicate that the KMK algorithm is capable in the improvement of centroid selection and distance measures in the assignments of data points. It is due to the better centroid selection mechanism by k-points selection based on the weight measures from the selected dataset. So, the obtained clusters are better in comparison to k-means.
{"title":"KMK based hybrid approach for the performance estimation in case of diabetes data","authors":"Yasir Minhaj Dubey Animesh Kumar Khan","doi":"10.19101/ijacr.2021.1152043","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152043","url":null,"abstract":"In this paper k-means clustering algorithm has been used with k-points (KMK) selection. It has been applied on the PIMA Indian diabetes dataset. It has been used for distance estimation, centroid selection, effect of data size variations and for the analysis of the complete record. The cluster section has been found to be improved based on k-point selection. It has been used for the assignment of initial centroid. The results indicate that the KMK algorithm is capable in the improvement of centroid selection and distance measures in the assignments of data points. It is due to the better centroid selection mechanism by k-points selection based on the weight measures from the selected dataset. So, the obtained clusters are better in comparison to k-means.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121973443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-30DOI: 10.19101/ijacr.2021.1152024
{"title":"Prediction of mathematics performance using educational data mining techniques","authors":"","doi":"10.19101/ijacr.2021.1152024","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152024","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-30DOI: 10.19101/ijacr.2021.1152031
{"title":"Classifying bug reports to bugs and other requests: an approach using topic modelling and fuzzy set theory","authors":"","doi":"10.19101/ijacr.2021.1152031","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152031","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-30DOI: 10.19101/ijacr.2021.1152017
{"title":"GU_DB : a database management system prototype for academia","authors":"","doi":"10.19101/ijacr.2021.1152017","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152017","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.19101/ijacr.2021.1152013
{"title":"Solar power based automatic irrigation system","authors":"","doi":"10.19101/ijacr.2021.1152013","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152013","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-31DOI: 10.19101/IJACR.2020.1048120
M. A. Tadlaoui, Mohamed Chekou
Blended learning has generated remarkable interest in educational research This interest is being concentrated increasingly throughout the Covid-19’s duration Indeed, this teaching method combines both, presential and distance learning This teaching method’s philosophy is quite simple it aims to exploit the qualities of the mentioned two teaching modes However, the usage of Blended learning isn't sufficiently advanced as it causes genuine issues in the educational scripting of the instructive substance In this research, it is an aim to concretize this philosophy in a fairly complicated course, as well as an advanced level: Python programming language for students of preparatory classes To achieve this goal, a developed a personalized course model using Bayesian networks capable of helping educators in their teaching practices in addition to their students’ cognitive processes is presented, as well as actualizing this model in a course creation application Moreover, the Python programming was tested with various understudies with various degree of aptitude in the subject educated The results presented in this paper, shows the effectivity of this approach in teaching complex course especially during the COVID19 period, based on both the satisfaction rate and the success rate metrics that was chosen to asset the following approach
{"title":"A blended learning approach for teaching python programming language: towards a post pandemic pedagogy","authors":"M. A. Tadlaoui, Mohamed Chekou","doi":"10.19101/IJACR.2020.1048120","DOIUrl":"https://doi.org/10.19101/IJACR.2020.1048120","url":null,"abstract":"Blended learning has generated remarkable interest in educational research This interest is being concentrated increasingly throughout the Covid-19’s duration Indeed, this teaching method combines both, presential and distance learning This teaching method’s philosophy is quite simple it aims to exploit the qualities of the mentioned two teaching modes However, the usage of Blended learning isn't sufficiently advanced as it causes genuine issues in the educational scripting of the instructive substance In this research, it is an aim to concretize this philosophy in a fairly complicated course, as well as an advanced level: Python programming language for students of preparatory classes To achieve this goal, a developed a personalized course model using Bayesian networks capable of helping educators in their teaching practices in addition to their students’ cognitive processes is presented, as well as actualizing this model in a course creation application Moreover, the Python programming was tested with various understudies with various degree of aptitude in the subject educated The results presented in this paper, shows the effectivity of this approach in teaching complex course especially during the COVID19 period, based on both the satisfaction rate and the success rate metrics that was chosen to asset the following approach","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-31DOI: 10.19101/ijacr.2020.1048053
R. Mapari, S. Narkhede, A. Navale, Jiyot Babrah
Waste management is a collective process of collection, segregation, transport and disposal of waste to the appropriate locations. The segregation of different types of wastes is the most important issue faced while designing a waste segregation and monitoring system. As a result of which, the waste is still being segregated manually, thus producing a harmful effect on the segregator itself. This project reports an automatic segregator and monitoring system. Plastic recycling is a solution to this. Plastic recycling is the process of regaining plastic discarded as waste and reprocessing it in order to reuse it. The segregation section consists of ATmega328 as its main controller. It includes an inductive proximity sensor, capacitive proximity sensor and a moisture sensor in order to sense the type of waste. Automatic waste segregator classifies the waste as plastic, dry, wet and metallic. The waste collection process is monitored by the monitoring section. The automatic waste segregator and monitoring system is a cost-effective management system for segregation of plastic, dry, wet and metallic waste without the continuous attention of a person. A simple controller with inductive, capacitive proximity sensors and moisture sensor are used to make the system low cost and simple. The achieved results are as per the expected objectives, which provide proper segregation of waste, without manual intervention.
{"title":"Automatic waste segregator and monitoring system","authors":"R. Mapari, S. Narkhede, A. Navale, Jiyot Babrah","doi":"10.19101/ijacr.2020.1048053","DOIUrl":"https://doi.org/10.19101/ijacr.2020.1048053","url":null,"abstract":"Waste management is a collective process of collection, segregation, transport and disposal of waste to the appropriate locations. The segregation of different types of wastes is the most important issue faced while designing a waste segregation and monitoring system. As a result of which, the waste is still being segregated manually, thus producing a harmful effect on the segregator itself. This project reports an automatic segregator and monitoring system. Plastic recycling is a solution to this. Plastic recycling is the process of regaining plastic discarded as waste and reprocessing it in order to reuse it. The segregation section consists of ATmega328 as its main controller. It includes an inductive proximity sensor, capacitive proximity sensor and a moisture sensor in order to sense the type of waste. Automatic waste segregator classifies the waste as plastic, dry, wet and metallic. The waste collection process is monitored by the monitoring section. The automatic waste segregator and monitoring system is a cost-effective management system for segregation of plastic, dry, wet and metallic waste without the continuous attention of a person. A simple controller with inductive, capacitive proximity sensors and moisture sensor are used to make the system low cost and simple. The achieved results are as per the expected objectives, which provide proper segregation of waste, without manual intervention.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-25DOI: 10.19101/ijacr.2019.940067
Sandra Johnson, A MohammedFayaz, S. Harikrishnan
Rear-end vehicular collision due to illegally parked and unusually slow-moving vehicles on National Highways can be avoided if drivers can get alert messages and full information needed to make an objective judgment about what is ahead. A lot of work has been done on collision avoidance strategies using various networking techniques. IoT based solutions area recent research trend. The objective of this project is to develop an intelligent system that will identify illegally parked and the slow-moving vehicles on highways using the message queuing telemetry transport (MQTT) protocol that enables vehicles to exchange their real-time information, such as velocity and position, with the neighbouring vehicles through brokers (also called as servers). MQTT being a lightweight IoT protocol for machine to machine communication is useful for an effective data transfer between vehicles. An optimal algorithm has been developed to accurately identify every vehicle in the vicinity of the region of interest and to calculate both speed and position of the vehicle and transfer data from one vehicle to another vehicle. The new algorithm is implemented in a Raspberry Pi using a global positioning system (GPS) module. The results show that the collision avoidance system that uses MQTT protocol can accurately generate alert messages 90% of the time when there are only ten or less than ten vehicles which is also the case in most highways. Also, the system is easy to implement without requiring extra equipment. Hence the new technique can be used in various types of vehicles, especially cargo trucks and buses that use the highways frequently.
{"title":"IoT based rear-end collision avoidance system in highways","authors":"Sandra Johnson, A MohammedFayaz, S. Harikrishnan","doi":"10.19101/ijacr.2019.940067","DOIUrl":"https://doi.org/10.19101/ijacr.2019.940067","url":null,"abstract":"Rear-end vehicular collision due to illegally parked and unusually slow-moving vehicles on National Highways can be avoided if drivers can get alert messages and full information needed to make an objective judgment about what is ahead. A lot of work has been done on collision avoidance strategies using various networking techniques. IoT based solutions area recent research trend. The objective of this project is to develop an intelligent system that will identify illegally parked and the slow-moving vehicles on highways using the message queuing telemetry transport (MQTT) protocol that enables vehicles to exchange their real-time information, such as velocity and position, with the neighbouring vehicles through brokers (also called as servers). MQTT being a lightweight IoT protocol for machine to machine communication is useful for an effective data transfer between vehicles. An optimal algorithm has been developed to accurately identify every vehicle in the vicinity of the region of interest and to calculate both speed and position of the vehicle and transfer data from one vehicle to another vehicle. The new algorithm is implemented in a Raspberry Pi using a global positioning system (GPS) module. The results show that the collision avoidance system that uses MQTT protocol can accurately generate alert messages 90% of the time when there are only ten or less than ten vehicles which is also the case in most highways. Also, the system is easy to implement without requiring extra equipment. Hence the new technique can be used in various types of vehicles, especially cargo trucks and buses that use the highways frequently.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-25DOI: 10.19101/ijacr.2019.940039
M. A. Tadlaoui, F. E. Moudden, Mohamed Khaldi
{"title":"The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE","authors":"M. A. Tadlaoui, F. E. Moudden, Mohamed Khaldi","doi":"10.19101/ijacr.2019.940039","DOIUrl":"https://doi.org/10.19101/ijacr.2019.940039","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-25DOI: 10.19101/ijacr.2019.940088
Hassan I. Ahmed, Abdurrahman A. Nasr, S. Abdel-Mageid, H. Aslan
Internet of Things (IoT) plays a well-known role in the interconnection of the physical and virtual objects for the purpose of exchanging information. IoT environment can connect billions of devices or objects, each one has an ID for identification proof. The IoT system is considered one of the most important technologies in recent decades, and the focus of attention in many fields including healthcare, industry, agriculture, military applications, and space science. Thus, it is more attractive for cyber-attacks. The IoT requires multi-dimensional security solutions such as confidentiality, integrity, and authentication services. In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems. It is known that the IoT system architecture consists of three layers: physical/sensor layer, network layer, and application layer. To be comprehensive and to facilitate comparative methods, the security problems of each layer separately and the suggested solutions have been analyzed. Moreover, the challenges of the IoT especially big data and also the evaluation strategies of the IoT system and their effects on the security operations have been evaluated.
{"title":"A survey of IoT security threats and defenses","authors":"Hassan I. Ahmed, Abdurrahman A. Nasr, S. Abdel-Mageid, H. Aslan","doi":"10.19101/ijacr.2019.940088","DOIUrl":"https://doi.org/10.19101/ijacr.2019.940088","url":null,"abstract":"Internet of Things (IoT) plays a well-known role in the interconnection of the physical and virtual objects for the purpose of exchanging information. IoT environment can connect billions of devices or objects, each one has an ID for identification proof. The IoT system is considered one of the most important technologies in recent decades, and the focus of attention in many fields including healthcare, industry, agriculture, military applications, and space science. Thus, it is more attractive for cyber-attacks. The IoT requires multi-dimensional security solutions such as confidentiality, integrity, and authentication services. In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems. It is known that the IoT system architecture consists of three layers: physical/sensor layer, network layer, and application layer. To be comprehensive and to facilitate comparative methods, the security problems of each layer separately and the suggested solutions have been analyzed. Moreover, the challenges of the IoT especially big data and also the evaluation strategies of the IoT system and their effects on the security operations have been evaluated.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}