Pub Date : 2015-08-12DOI: 10.4172/0976-4860.1000142
Mathew George
Multiple Fruit and Vegetable Fruit Sorting System using Machine Vision is presented in this paper. The grading systems were developed for easing the labor intensive work and create consistency in the quality of the product. The current grading systems involved in the fruit sorting cater to only one type of fruit. So by adding more features like fruit and vegetable identification under variable background condition can enhance the quality of the agricultural produce. This paper proposes a technique to achieving multiple fruit and vegetable sorting using fuzzy logic and K-Means clustering method by using a low cost image capturing device.
{"title":"Multiple Fruit and Vegetable Sorting System Using Machine Vision","authors":"Mathew George","doi":"10.4172/0976-4860.1000142","DOIUrl":"https://doi.org/10.4172/0976-4860.1000142","url":null,"abstract":"Multiple Fruit and Vegetable Fruit Sorting System using Machine Vision is presented in this paper. The grading systems were developed for easing the labor intensive work and create consistency in the quality of the product. The current grading systems involved in the fruit sorting cater to only one type of fruit. So by adding more features like fruit and vegetable identification under variable background condition can enhance the quality of the agricultural produce. This paper proposes a technique to achieving multiple fruit and vegetable sorting using fuzzy logic and K-Means clustering method by using a low cost image capturing device.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"22 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81713280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-18DOI: 10.4172/0976-4860.1000143
Kanika Minhas
Denial of Service attacks is frequently presenting an increasing threat to the global inter-networking infrastructure in networking area and scenario. The algorithm for Transfer Control Protocol (TCP) congestion control is highly efficient for the various networking areas and operations as well its internal assumption of end-system cooperation results is well prone to attack by high-rate flows. A Shrew attack uses the concept of a low-rate burst which is carefully designed to use the TCP’s retransmission timeout mechanism in an unfair way and can affect the bandwidth of a TCP flow in a smooth manner without coming into appearance as an intruder. A Shrew attack has further classifications such as a low rate shrew attack or a high rate shrew attack. A high rated shrew attack uses the concept of timely sending high rate packet stream in low frequency. Such attack can affect the performance of a network to a large extent.
拒绝服务攻击频繁出现,在网络领域和场景中对全球网络间基础设施构成越来越大的威胁。TCP (Transfer Control Protocol)拥塞控制算法对各种网络区域和业务都具有很高的效率,但其内部对端系统合作结果的假设容易受到高速率流的攻击。鼩鼱攻击使用低速率突发的概念,该概念被精心设计为以不公平的方式使用TCP的重传超时机制,并且可以以平滑的方式影响TCP流的带宽,而不会以入侵者的形式出现。鼩鼱攻击有进一步的分类,如低率鼩鼱攻击或高率鼩鼱攻击。高速率鼩鼱攻击利用了在低频率下及时发送高速率数据包流的概念。这种攻击会在很大程度上影响网络的性能。
{"title":"A Study on High Rate Shrew DDOS Attack","authors":"Kanika Minhas","doi":"10.4172/0976-4860.1000143","DOIUrl":"https://doi.org/10.4172/0976-4860.1000143","url":null,"abstract":"Denial of Service attacks is frequently presenting an increasing threat to the global inter-networking infrastructure in networking area and scenario. The algorithm for Transfer Control Protocol (TCP) congestion control is highly efficient for the various networking areas and operations as well its internal assumption of end-system cooperation results is well prone to attack by high-rate flows. A Shrew attack uses the concept of a low-rate burst which is carefully designed to use the TCP’s retransmission timeout mechanism in an unfair way and can affect the bandwidth of a TCP flow in a smooth manner without coming into appearance as an intruder. A Shrew attack has further classifications such as a low rate shrew attack or a high rate shrew attack. A high rated shrew attack uses the concept of timely sending high rate packet stream in low frequency. Such attack can affect the performance of a network to a large extent.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"44 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88998858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-27DOI: 10.4172/0976-4860.1000141
O. Toluwalope, I. Oluwatuase
Glaze making in some developing countries has not been encouraging, therefore making the act of glazing going into extinct. This setback is due to unavailability of required fluxes for formulating a workable low temperature transparent glaze. Meanwhile glass of different properties like Grade B borosilicate and Grade A borosilicate glasses which contain the required silica/flux ratio for formulating a low temperature transparent glazes are found to be abundantly available as waste, which are discarded and therefore polluting the immediate environment. This paper therefore discuss the availability and utilization of this particular type of waste glasses for formulating transparent glazes by processing and sieving the waste glasses into its finest particle called cullet. This processed cullet was used as a source of flux/silica with kaolin supplying the alumina for stabilizing the glaze. Cullet was composed in several proportions with kaolin in ratio 1-10 and vice versa. The composed glazes were fired at different temperature and atmosphere to detect the best condition at which cullet can be utilized as a source of silica/flux in formulating a transparent glaze.
{"title":"The Use of Waste Borosilicate Glasses for Formulating a Functional Transparent Glaze","authors":"O. Toluwalope, I. Oluwatuase","doi":"10.4172/0976-4860.1000141","DOIUrl":"https://doi.org/10.4172/0976-4860.1000141","url":null,"abstract":"Glaze making in some developing countries has not been encouraging, therefore making the act of glazing going into extinct. This setback is due to unavailability of required fluxes for formulating a workable low temperature transparent glaze. Meanwhile glass of different properties like Grade B borosilicate and Grade A borosilicate glasses which contain the required silica/flux ratio for formulating a low temperature transparent glazes are found to be abundantly available as waste, which are discarded and therefore polluting the immediate environment. This paper therefore discuss the availability and utilization of this particular type of waste glasses for formulating transparent glazes by processing and sieving the waste glasses into its finest particle called cullet. This processed cullet was used as a source of flux/silica with kaolin supplying the alumina for stabilizing the glaze. Cullet was composed in several proportions with kaolin in ratio 1-10 and vice versa. The composed glazes were fired at different temperature and atmosphere to detect the best condition at which cullet can be utilized as a source of silica/flux in formulating a transparent glaze.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"2 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82334750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-18DOI: 10.4172/0976-4860.1000140
Farag Ms, El-Terhy Aa, El-Askary Wa, H. As
Steam ejector is an important component in engineering applications, which require high vacuum, such as steam plant condenser. Prediction of steam ejector performance is very significant tool for the design of the ejector. The steam ejector consists of three parts; nozzle, mixing chamber and diffuser. The nozzle has the task of creating the vacuum required. In the current paper numerical treatment of wet steam flow through the nozzle of an ejector is presented. The first task of this work is to test and evaluate several turbulence models on a generic case, constructed for turbulent steam flow in a convergent-divergent nozzle. The effect of pressure ratios, that is responsible for controlling the location or absence of the generated shock wave as well as the impact of the shock wave on the condensation of steam inside the nozzle are numerically concerned. These features are clearly observed from the pressure distribution, Mach number, liquid mass fraction, droplet nucleation rate, droplet critical radius and static temperature. It is concluded from the current work that the standard k-ω model is the most appropriate turbulence model for simulating this complex flow compared to the other considered models for nozzle steam flow sumulation.
{"title":"Numerical Study on condensation Process of Steam Flow in Nozzles","authors":"Farag Ms, El-Terhy Aa, El-Askary Wa, H. As","doi":"10.4172/0976-4860.1000140","DOIUrl":"https://doi.org/10.4172/0976-4860.1000140","url":null,"abstract":"Steam ejector is an important component in engineering applications, which require high vacuum, such as steam plant condenser. Prediction of steam ejector performance is very significant tool for the design of the ejector. The steam ejector consists of three parts; nozzle, mixing chamber and diffuser. The nozzle has the task of creating the vacuum required. In the current paper numerical treatment of wet steam flow through the nozzle of an ejector is presented. The first task of this work is to test and evaluate several turbulence models on a generic case, constructed for turbulent steam flow in a convergent-divergent nozzle. The effect of pressure ratios, that is responsible for controlling the location or absence of the generated shock wave as well as the impact of the shock wave on the condensation of steam inside the nozzle are numerically concerned. These features are clearly observed from the pressure distribution, Mach number, liquid mass fraction, droplet nucleation rate, droplet critical radius and static temperature. It is concluded from the current work that the standard k-ω model is the most appropriate turbulence model for simulating this complex flow compared to the other considered models for nozzle steam flow sumulation.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"42 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80668403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.4172/0976-4860.1000151
Shaik Khader Basha, P. Rao, K. Rajagopal
People have been working seriously in the search for best alternative fuels to safeguard the environment ever since the transportation and industrial fields started growing widely. Among such alternatives acetylene has proved to be a better fuel for internal combustion engines due to its low cost, simplicity in manufacturing and excellent combustion characteristics. Moreover it has less carbon content compared to other fuels, which plays a central role in environmental degradation. However the fuel must be safe and environmentally friendly and also readily usable in existing engines without any significant design modifications. Acetylene is produced in parallel to the engine operation taking proper care to avoid back firing. We propose in the present study that acetylene be the safe and appropriate fuel for a compression ignition engine. Diesel engine is selected with a subsidiary mixing box for a homogeneous mixture of air and acetylene. The experiments are conducted with fixed acetylene flow rates from 0.1Lit/min to 5Lit/min with an increase of 0.5Lit/min in every step. The engine is tested at various loads, keeping track of combustion performance to find out the optimum fuel flow rates and also to have reduced emissions. The results show that the performance of the Acetylene enriched engine is nearer to the pure diesel engine with reduced emissions. It is concluded that acetylene could be the better alternative fuel without compromising brake thermal efficiency and safe operation with a moderate increment of smoke and NOx.
{"title":"Experimental Investigation of Performance of Acetylene Fuel Based Diesel Engine","authors":"Shaik Khader Basha, P. Rao, K. Rajagopal","doi":"10.4172/0976-4860.1000151","DOIUrl":"https://doi.org/10.4172/0976-4860.1000151","url":null,"abstract":"People have been working seriously in the search for best alternative fuels to safeguard the environment ever since the transportation and industrial fields started growing widely. Among such alternatives acetylene has proved to be a better fuel for internal combustion engines due to its low cost, simplicity in manufacturing and excellent combustion characteristics. Moreover it has less carbon content compared to other fuels, which plays a central role in environmental degradation. However the fuel must be safe and environmentally friendly and also readily usable in existing engines without any significant design modifications. Acetylene is produced in parallel to the engine operation taking proper care to avoid back firing. We propose in the present study that acetylene be the safe and appropriate fuel for a compression ignition engine. Diesel engine is selected with a subsidiary mixing box for a homogeneous mixture of air and acetylene. The experiments are conducted with fixed acetylene flow rates from 0.1Lit/min to 5Lit/min with an increase of 0.5Lit/min in every step. The engine is tested at various loads, keeping track of combustion performance to find out the optimum fuel flow rates and also to have reduced emissions. The results show that the performance of the Acetylene enriched engine is nearer to the pure diesel engine with reduced emissions. It is concluded that acetylene could be the better alternative fuel without compromising brake thermal efficiency and safe operation with a moderate increment of smoke and NOx.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"2015 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86944784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.4172/0976-4860.1000152
Onwubiko Agozino
The principles of research methodology were borrowed by social scientists from the natural sciences. However, research methods courses are more likely to be found in the social sciences today while the natural sciences take the principles of methodology for granted except in courses on laboratory methods in physics and chemistry or numeric methods in mathematics. This article suggests that it is time for the social sciences to serve as a model for the natural sciences by emphasizing the importance of teaching quantitative and qualitative research methods courses and adhering to the principles in research. The important principle of validity will be used to illustrate what modern physics, for example, could relearn from the social sciences.
{"title":"Validity Threats in Modern Science: Why Social Science Research Methods Should be Compulsory for STEM Disciplines","authors":"Onwubiko Agozino","doi":"10.4172/0976-4860.1000152","DOIUrl":"https://doi.org/10.4172/0976-4860.1000152","url":null,"abstract":"The principles of research methodology were borrowed by social scientists from the natural sciences. However, research methods courses are more likely to be found in the social sciences today while the natural sciences take the principles of methodology for granted except in courses on laboratory methods in physics and chemistry or numeric methods in mathematics. This article suggests that it is time for the social sciences to serve as a model for the natural sciences by emphasizing the importance of teaching quantitative and qualitative research methods courses and adhering to the principles in research. The important principle of validity will be used to illustrate what modern physics, for example, could relearn from the social sciences.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"1 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88194033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-31DOI: 10.4156/IJACT.VOL5.ISSUE11.12
Z. Muda, Abdeladeem Ab. Ahfaidha, N. Udzir, R. Mahmod
Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is focused on the encryption function and the security tradeoff between pseudorandom number generators and the encryption function. Despite the focus on the security of the key generation, there is still considerable potential for attacks on the secret key as long as the encryption function leaks valuable information about the key to the attacker. Hence, it is important to study the possibility of constructing a new encryption model based on a stream cipher, while considering security and throughput tradeoffs. In this paper a new approach to data encryption based on its integration with a synchronous stream cipher is presented. This new approach is named the “Permuted Synchronous Stream Cipher” (PSSC). The sophisticated design of the PSSC for providing diffusion to stream ciphers allows it to be easily incorporated into most of the existing proposed stream ciphers to provide better security. The PSSC key stream is constructed from two parts, namely the key- bits and a corresponding diffusion maps. The method involves inserting random bits into the ciphertext followed by bit rotation and XORing bitwise. Therefore, any statistical pattern or information about the secret key that may be reflected in or leaked into the cipher’s output can be masked by performing simple bit diffusion on the ciphertext based on a pseudorandom sequence of diffusion maps. We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data protection with better security.
{"title":"A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion","authors":"Z. Muda, Abdeladeem Ab. Ahfaidha, N. Udzir, R. Mahmod","doi":"10.4156/IJACT.VOL5.ISSUE11.12","DOIUrl":"https://doi.org/10.4156/IJACT.VOL5.ISSUE11.12","url":null,"abstract":"Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is focused on the encryption function and the security tradeoff between pseudorandom number generators and the encryption function. Despite the focus on the security of the key generation, there is still considerable potential for attacks on the secret key as long as the encryption function leaks valuable information about the key to the attacker. Hence, it is important to study the possibility of constructing a new encryption model based on a stream cipher, while \u0000considering security and throughput tradeoffs. In this paper a new approach to data encryption based on its integration with a synchronous stream cipher is presented. This new approach is named the “Permuted Synchronous Stream Cipher” (PSSC). The sophisticated design of the PSSC for providing diffusion to stream ciphers allows it to be easily incorporated into most of the existing proposed stream ciphers to provide better security. The PSSC key stream is constructed from two parts, namely the key- \u0000bits and a corresponding diffusion maps. The method involves inserting random bits into the ciphertext \u0000followed by bit rotation and XORing bitwise. Therefore, any statistical pattern or information about the secret key that may be reflected in or leaked into the cipher’s output can be masked by performing simple bit diffusion on the ciphertext based on a pseudorandom sequence of diffusion maps. We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data \u0000protection with better security.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"5 1","pages":"109-117"},"PeriodicalIF":0.0,"publicationDate":"2013-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70437855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-31DOI: 10.4156/IJACT.VOL5.ISSUE11.22
Yi-seul Park, J. S. Park
Abstract This paper extends the study made on determining the inelastic lateral torsional buckling strength of monosymmetric stepped I-beam in consideration of its degree of monosymmetry by making a destructive test while subjecting the beam to a concentrated load. Prior to the test, numerical values of the expected results are estimated by finite element analysis using the program ABAQUS. The numerical results are estimated by creating a model which experiences the same conditions as that of the test specimen. Then, a comparison is made with the experimental results, the results from the proposed equation and the results from the finite element analysis. In succession, the safety and economic feasibility of the proposed equation is evaluated. Finally, the comparisons made showed that the proposed equation yielded results that are acceptable and has values that are similar to the values yielded by the test. More tests are needed to determine if the proposed equation is also suitable for other loading conditions.
{"title":"An Experimental Study on Inelastic Lateral-Torsional Buckling Strength of Monosymmetric Stepped I-Beam Subjected to a Concentrated Load","authors":"Yi-seul Park, J. S. Park","doi":"10.4156/IJACT.VOL5.ISSUE11.22","DOIUrl":"https://doi.org/10.4156/IJACT.VOL5.ISSUE11.22","url":null,"abstract":"Abstract This paper extends the study made on determining the inelastic lateral torsional buckling strength of monosymmetric stepped I-beam in consideration of its degree of monosymmetry by making a destructive test while subjecting the beam to a concentrated load. Prior to the test, numerical values of the expected results are estimated by finite element analysis using the program ABAQUS. The numerical results are estimated by creating a model which experiences the same conditions as that of the test specimen. Then, a comparison is made with the experimental results, the results from the proposed equation and the results from the finite element analysis. In succession, the safety and economic feasibility of the proposed equation is evaluated. Finally, the comparisons made showed that the proposed equation yielded results that are acceptable and has values that are similar to the values yielded by the test. More tests are needed to determine if the proposed equation is also suitable for other loading conditions.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"5 1","pages":"211-216"},"PeriodicalIF":0.0,"publicationDate":"2013-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70438332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-31DOI: 10.4156/IJACT.VOL5.ISSUE11.23
Kyeong-Hwa Kim, Myung-Bok Kim
Abstract DSP-based on-line dead time compensation strategy of a permanent magnet synchronous motor (PMSM) drive through a signal processing and harmonic extraction for a robot arm application is proposed. The proposed scheme is based on monitoring the fifth-order harmonic component through the signal processing and harmonic component extraction. The proposed scheme does not require a periodic information of current for the harmonic calculation nor parameter information. Also, it gives a faster estimation performance than the conventional harmonic approach. The effectiveness of the proposed scheme is verified through the comparative simulations and experiments using DSP TMS320F28335.
{"title":"DSP-based New On-line Dead Time Compensation Strategy of a PMSM Drive through Digital Signal Processing and Harmonic Component Extraction for a Robot Arm Application","authors":"Kyeong-Hwa Kim, Myung-Bok Kim","doi":"10.4156/IJACT.VOL5.ISSUE11.23","DOIUrl":"https://doi.org/10.4156/IJACT.VOL5.ISSUE11.23","url":null,"abstract":"Abstract DSP-based on-line dead time compensation strategy of a permanent magnet synchronous motor (PMSM) drive through a signal processing and harmonic extraction for a robot arm application is proposed. The proposed scheme is based on monitoring the fifth-order harmonic component through the signal processing and harmonic component extraction. The proposed scheme does not require a periodic information of current for the harmonic calculation nor parameter information. Also, it gives a faster estimation performance than the conventional harmonic approach. The effectiveness of the proposed scheme is verified through the comparative simulations and experiments using DSP TMS320F28335.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"28 15 1","pages":"217-226"},"PeriodicalIF":0.0,"publicationDate":"2013-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70438423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-31DOI: 10.4156/IJACT.VOL5.ISSUE11.37
Rocy Martinez, Heedong Hong, Daewon Lee
{"title":"Automated Essay Scoring System By Using Support Vector Machine","authors":"Rocy Martinez, Heedong Hong, Daewon Lee","doi":"10.4156/IJACT.VOL5.ISSUE11.37","DOIUrl":"https://doi.org/10.4156/IJACT.VOL5.ISSUE11.37","url":null,"abstract":"","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"5 1","pages":"316-322"},"PeriodicalIF":0.0,"publicationDate":"2013-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70438784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}