IOSR Journal of Computer Engineering (IOSR-JCE)

Volume 15- Issue 6

Paper Type : Research Paper
Title : A Survey on Fuzzy Association Rule Mining Methodologies
Country : India
Authors : Aritra Roy, Rajdeep Chatterjee
: 10.9790/0661-1560108      logo

Abstract: Fuzzy association rule mining (Fuzzy ARM) uses fuzzy logic to generate interesting association rules. These association relationships can help in decision making for the solution of a given problem. Fuzzy ARM is a variant of classical association rule mining. Classical association rule mining uses the concept of crisp sets. Because of this reason classical association rule mining has several drawbacks. To overcome those drawbacks the concept of fuzzy association rule mining came. Today there is a huge number of different types of fuzzy association rule mining algorithms are present in research works and day by day these algorithms are getting better. But as the problem domain is also becoming more complex in nature, continuous research work is still going on. In this paper, we have studied several well-known methodologies and algorithms for fuzzy association rule mining. Four important methodologies are briefly discussed in this paper which will show the recent trends and future scope of research in the field of fuzzy association rule mining.

Keywords: Knowledge discovery in databases, Data mining, Fuzzy association rule mining, Classical association rule mining, Very large datasets, Minimum support, Cardinality, Certainty factor, Redundant rule, Equivalence , Equivalent rules

[1] Fayyad, Usama; Piatetsky-Shapiro, Gregory; Smyth, Padhraic: The KDD Process for Extracting Useful Knowledge from Volumes of Data. Communications of the ACM, Volume 39, Issue 11, Page(s): 27 – 34, 1996.
[2] http://www.umsl.edu/~joshik/msis480/chapt11.htm
[3] J. Han and M. Kamber, Data Mining: Concepts and Techniques: The Morgan Kaufmann Series, 2001.
[4] Hipp, Jochen; Guentzer, Ulrich; Nakhaeizadeh, Gholamreza: Algorithms for Association Rule Mining - A General Survey and Comparison. ACM SIGKDD Explorations Newsletter, Volume 2, Issue 1, 2000.
[5] Agrawal, Rakesh; Imielinski, Tomasz; Swami, Arun: Mining Association Rules between Sets of Items in Large Databases. Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993.
[6] R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules in Large Databases", Proc. of the 20th International Conference on Very Large Data Bases, VLDB, Page(s): 487-499, 1994.
[7] Han, J, Pei, J, Yin, Y: Mining Frequent Patterns without Candidate Generation. In: SIGMOD Conference, ACM Press, Page(s): 1-12, 2000.
[8] Türks¸en, I.B. and Tian Y. 1993. Combination of rules and their consequences in fuzzy expert systems, Fuzzy Sets and Systems, No. 58,3-40, 1993.
[9] http://www.cs.cmu.edu/Groups/AI/html/faqs/ai/fuzzy/part1/faq-doc-4.html
[10] L.A.Zadeh.Outline of a new approach to the analysis of complex systems and decision processes. IEEE Transactions on System, Man, and Cybernetics, Volume 3, Pages(s):28-44, January, 1973.


Paper Type : Research Paper
Title : Unified V- Model Approach of Re-Engineering to reinforce Web Application Development
Country : India
Authors : Poonam Dhiman, Nishu Singh, Kaushal Kumar
: 10.9790/0661-1560917      logo

Abstract: The diverse and dynamic nature of elements and techniques used to develop Web Application, due to the lack of testing technique and effective programming principles which are used for implementing basic software engineering principles, and undisciplined development processes insure by the high pressure of a very short time to satisfy market request to develop Web application. This paper represent approaches of reengineering in web that how reengineering process can be carried out to evolution activities in legacy system as well we propose the V-model for re-engineering process. This paper presents the need of the technologies and approaches for building new web-services from existing web-applications. In this paper we present the processing of V-model for Reengineering in web application which is the extension of V-model used in software domain. In our approach V-model incorporates with the methodology throughout the phases of web development process to re-engineer the web system.

Keywords: Re-engineering, reverse engineering, forward engineering, V-model, application migration.

[1] P. Fraternali, Tools and Approaches for Developing Data-Intensive web Applications: a Survey, ACM Computing Surveys, 1999. [2] S. Selmi, N. Kraiem, and H. Ben Ghezala, Toward a comprehension view of web engineering, 2005.

[3] E. Chikofsky and J.H.Cross, Reverse Engineering and Design Recovery: A Taxonomy, IEEE Software Engineering journal, (Jan. 1990), pp 13-17.
[4] IEEE Std 1219-1998, In IEEE Standards Software Engineering, 1999 Edition, Volume Two, Process Standards, IEEE Press.
[5] Jovanovic, N. ; Secure Syst. Lab., Tech. Univ. of Vienna ; Kruegel, C. ; Kirda, E., a static analysis tool for detecting Web application vulnerabilities, Security and Privacy, 2006 IEEE.

[6] X. Zhang ; Comput. & Inf. Eng. Coll., Hohai Univ., Nanjing, China ; Z. Wang, e-Business and Information System Security (EBISS), 2010 2nd International Conference on 22-23 may 2010.

[7] J. Conallen, Building Web Applications with UML, Addison- Wesley Publishing Company, Reading, MA, 1999.

[8] J. Conallen, Modelling web application architectures with uml, Communications of the Association for Computing Machinery, 42(10), October 1999.
[9] J. Conallen, Modelling web application with uml, White paper, Conallen Inc. http://www.conallen.com/whitepapers/webapps/Modellingwebapplication.htm, March 1999.

[10] D. Lucca GA, Fasolino AR, De Carlini U, Pace F, Tramontana P. Comprehending, Web applications by a clustering based approach, Proceedings 10th Workshop on Program Comprehension. IEEE Computer Society Press: Los Alamitos CA,2002; 261–270.


Paper Type : Research Paper
Title : A Survey on Vehicle to Infrastructure Communication System
Country : India
Authors : Ms. Bharati Punjabi
: 10.9790/0661-1561822      logo

Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE 802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture mode with at least one central access point connected to a wired network. In this paper we present an experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario. In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented when each of the three systems are used to implement the V2I link.
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance; transport; mobile stations; auto traffic; vehicle speed.

............................................


Paper Type : Research Paper
Title : Steiner Tree: approach applying for shortest path in selected network
Country : India
Authors : Manisha Wadhwa, Dr. Kanak Saxena
: 10.9790/0661-1562326      logo

Abstract: This paper focus on approach for shortest path from source to destination in which an autonomous system for virtual private network, whose communicate with each other in a private area. For selecting a shortest path we focus on Steiner tree. The general concept of finding minimum path describes an undirected graph, in which vertices (node) and edges (links) are playing main role. we focus on Steiner tree problem, extra intermediate vertices and edges may be added to the graph in order to reduce the length of the spanning tree.
Keywords: Steiner tree, Autonomous system (AS).

[1] D.-Z. Du, J. Smith and J. Rubinstein, Advances in Steiner Trees., Dordrecht: Kluwer Academic Publishers, 2000.
[2] G. Singh, S. Das, S. V. Gosavi and S. Pujar, "Ant Colony Algorithms for Steiner Trees: An Applicatoin to Routing in Sensor Networks," in Recent Developments in Biologically Inspired Computing, 2005, pp. 180-205.
[3] S. Das, S. Gosavi, W. Hsu and S. Vaze, "An Ant Colony Approach for the Steiner Tree Problem," New York, Proc. of Genectic and Evolutionay Computing Conference, 2012.
[4] L. Tay, 18 February 2011. [Online]. Available: http://www.itnews.com.au/News/248359,ants-buildcheapest- networks.aspx. [Accessed 11 August 2012].
[5] H. J. Promel and A. Steger. The Steiner Tree Problem: A Tour Through Graphs, Algo-rithms, and Complexity. Friedrich Vieweg and Son, Braunschweig, 2002.
[6] M. R. GAREY, R. L. GRAHAM and D. S. JOHNSON (1977) The complexity of computing Steiner minimal trees. SIAM J. AppI. Math. 34, 477-495. 32.
[7] J. HESSER, R. MANNER and 0. STUCKY (1989) Optimization of Steiner trees using genetic algorithms. Proc. 3rd Int. Conf. Genetic Algorithms (J. D. SCHAFFER, Ed.) 231-236.
[8] Glencora Borradaile , Claire Kenyon-Mathieu , Philip Klein, A polynomial-time approximation scheme for Steiner tree in planar graphs, Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, p.1285-1294, January 07-09, 2007, New Orleans, Louisiana
[9] S. E. Dreyfus and R. A. Wagner. The Steiner problem in graphs. Networks, 1:195--207, 1972.
[10] Deeparnab Chakrabarty , Nikhil R. Devanur , Vijay V. Vazirani, New geometry-inspired relaxations and algorithms for the metric steiner tree problem, Proceedings of the 13th international conference on Integer programming and combinatorial optimization, May 26-28, 2008, Bertinoro, Italy.


Paper Type : Research Paper
Title : An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash funcations (MD5 and SHA variants)
Country : India
Authors : Sankalp Prakash, Mridula Purohit
: 10.9790/0661-1562733      logo

Abstract: Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks. Digital Signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and key agreement. The PKI (Public Key Infrastructure) based digital signature architecture is related with RSA algorithm and secure Hash functions (MD5 &, SHA variants). RSA digital signature algorithm is an asymmetric cryptographic method whose security is associated with difficulty of factorization and hash function is applied to the message to yields a fixed-size message digest. This paper explores the PKI architecture based digital signature and presents an efficient way of its implementation and discusses various issues associated with signature schemes based upon RSA and hash functions. The results show that signing and verification are much faster in the developed application.
Keywords: Digital Signature, MD5, RSA, SHA1, SHA2.

[1] Bruce Schneier, Applied Cryptography Protocols, Algorithms, and Source Code in C, 2nd ed. John Wiley & Sons, 1996.
[2] W.C.Cheng, C.F.Chou and L.Golubchik, "Performance of Batch-based Digital Signatures," in 10th IEEE International Symposium on Modeling , 2002.
[3] Burton S. Kaliski, "RSA Digital Signatures," Dr. Dobb's Journal, May 2001, collabroation.cmc.ec.gc.ca/science/rpn/biblio/ddj/Website/articles/DDJ/2001/0105/0105c/0105c.htm.
[4] R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[5] S. R. Subramanya and Byung K. Yi, "Digital Signatures," IEEE Potentials, vol. 06, pp. 5-8, Apr. 2006.
[6] D. E. Denning, "Digital signature with RSA and other Public-key cryptosystems," Comm. of the ACM, vol. 27, no. 4, pp. 388-392, Apr. 1984.
[7] "Biometrics: the Future of Identification," IEEE Computer, vol. 33, pp. 46-81, 2000.
[8] W.Diffie and M.E.Hellman, "New Directions in Cryptography," IEEE Transactions Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[9] Prakash Kuppuswamy, Peer Mohammad Appa and Saeed Q Y Al-Khalidi, "A New Efficient Digital Signature Scheme Algorithm based on Block cipher," IOSR Journal of Computer Engineering, vol. 7, no. 1, pp. 47-52, Nov. 2012.
[10] CGI Group Inc. (2004) Public Encryption and Digital Signature: How do they work?. [Online].


Paper Type : Research Paper
Title : Design Issues for Search Engines and Web Crawlers: A Review
Country : India
Authors : Deepak Kumar, Aditya Kumar
: 10.9790/0661-1563437      logo

Abstract: The World Wide Web is a huge source of hyperlinked information contained in hypertext documents. Search engines use web crawlers to collect these web documents from web for storage and indexing. The prompt growth of the World Wide Web has posed incomparable challenges for the designers of search engines and web crawlers; that help users to retrieve web pages in a reasonable amount of time. In this paper, a review on need and working of a search engine, and role of a web crawler is being presented.
Keywords: Internet, www, search engine, types, design issues, web crawlers.

[1]. A.K. Sharma, J. P. Gupta, D. P. Agarwal, "Augment Hypertext Documents suitable for parallel crawlers" , accepted for presentation and inclusion in the proceedings of WITSA-2003, a National workshop on Information Technology Services and Applications, Feb'2003, New Delhi.
[2]. Alexandros Ntoulas, Junghoo Cho, Christopher Olston, "What's New on the Web ? The Evolution of the Web from a Search Engine Perspective", In Proceedings of the World-Wide Web Conference (WWW), May 2004.
[3]. Arvind Arasu, Junghoo Cho, Hector Garcia-Molina, Andreas Paepcke, Sriram Raghavan, "Searching the Web", ACM Transactions on Internet Technology, 1(1): August 2001.
[4]. Baldi, Pierre, "Modeling the Internet and the Web: Probabilistic Methods and Algorithms", 2003.
[5]. Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard, Kleinrock, Daniel C. Lynch, Jon
[6]. Postel, Larry G. Roberts, Stephen Wolff, "A Brief History of the Internet", www.isoc.org/internet/his tory,
[7]. Brian E. Brewington, George Cybenko, "How dynamic i s the web.", In Proceedings of the Ninth Internationa l World-Wide Web Conference, Amsterdam, Netherlands, May 2000.
[8]. Dirk Lewandowski, "Web searching, search engines an d Information Retrieval, Information Services & Use", 25 (2005) 137-147, IOS Press, 2005.
[9]. Franklin, Curt, "How Internet Search Engines Work", 2002, www.howstuffworks.com.
[10]. Grossan. B, "Search Engines : What they are, how th ey work, and practical suggestions for getting the most out of them", Feb97, webreference.com.


Paper Type : Research Paper
Title : Estimation of Arm Joint Angles from Surface Electromyography signals using Artificial Neural Networks
Country : India
Authors : Sauvik Das Gupta, Sourav Das, Partha Das, S. K. Masud Hossain, Subhajit Ghosh, Shanta Mazumder
: 10.9790/0661-1563844      logo

Abstract: Vicon system is implemented in almost every motion analysis systems. It has many applications like robotics, gaming, virtual reality and animated movies. The motion and orientation plays an important role in the above mentioned applications. In this paper we propose a method to estimate arm joint angles from surface Electromyography (s-EMG) signals using Artificial Neural Network (ANN). The neural network is trained with EMG data from wrist flexion and extension action as input and joint angle values from the vicon system as target. The results shown in this paper illustrate the neural network performance in estimating the joint angle values during offline testing.
Keywords: Vicon system, Joint angle, Surface EMG, Artificial Neural Network, Virtual reality, Robotics.

[1] Ajiboye, Weir, "A Heuristic Fuzzy Logic Approach to EMG Pattern Recognition forMultifunctional Prosthesis Control", IEEE TRANSACTIONS ON NEURAL SYSTEMS ANDREHABILITATION ENGINEERING, VOL. 13, NO. 3, SEPTEMBER 2005
[2] Momen, Krishnan, Chau, "Real-Time Classification of Forearm Electromyographic SignalsCorresponding to User-Selected Intentional Movements for Multifunction Prosthesis Control",IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING,VOL. 15, NO. 4, DECEMBER 2007
[3] Kuiken, Li,Lock, Lipschutz, Miller, Stubblefield, Englehart, "Targeted Muscle Reinnervation for Real-time Myoelectric Control of Multifunction Artificial Arms", 2009 American Medical Association
[4] Srinivasan, DasGupta, Sheng, Chen, "Estimation of Hand Force from Surface Electromyography Signals using Artificial Neural Network", Tenth World Congress on Intelligent Control and Automation, July 6-8, 2012, Beijing, China
[5] "NI-9234 Data Acquisition Board" [Online].Available:http://sine.ni.com/nips/cds/view/p/lang/en/nid/208802
[6] "Vicon Motion Capture System" [Online].
[7] "Myoscan–Z EMG Sensor" [Online].
[8] "LevenbergMarquardtBackpropagationalgorithm
[9] "ScaledConjugateGradientbackpropagationalgorithm",[Online]
[10 ]"HighBiasandHighVariance",[Online],Available:


Paper Type : Research Paper
Title : An Intermediate Service Composer Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices
Country : India
Authors : K. Kishoreanthuvan, S. Balaji, S. Thamizharasan, K. Kuzhandaivelu
: 10.9790/0661-1564548      logo

Abstract: Web services describe a standardized way of integrating Web-based applications over an Internet protocol backbone. Mobile devices are getting more pervasive and it is becoming increasingly necessary to integrate web services into applications that run on these devices. We introduce a novel approach for dynamically invoking web service methods from mobile devices with minimal user intervention that only involves entering a search phrase and values for the method parameters. The architecture overcomes technical challenges that involve consuming discovered services dynamically by introducing a man-in-the middle (MIM) server that provides a web service whose responsibility is to discover needed services and build the client-side proxies at runtime. The architecture moves to the MIM server energy-consuming tasks. Such tasks involve communication with servers over the Internet, XML-parsing of files, and on-the-fly compilation of source code. The MIM Server programmed with the intelligence to identify a set of services whose collective functionality can serve the user's request. We perform extensive evaluations of the system performance to measure scalability as it relates to the capacity of the MIM server in handling mobile client requests, and device battery power savings resulting from delegating the service discovery tasks to the server.
Keywords: Geocode Services, Location Based Services (LBS), Man-in- the-Middle (MIM), Web services, XForms.

[1] Q. Yu, X. Liu, A. Bouguettaya, and B. Medjahed, Deploying and Managing Web Services: Issues, Solutions, and Directions, The Very Large Databases J., (Springer) vol. 17, no. 3, pp. 537-572, 2008.
[2] Hassan Artail, Kassem Fawaz, Ali Ghandour, A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices IEEE Trans. Services Computing, Vol. 5, No. 1, January-March 2012
[3] Q. Sheng, B. Benatallah, Z. Maamar, and A. Ngu, Configurable Composition and Adaptive Provisioning of Web Services, IEEE Trans. Services Computing, vol. 2, no. 1, pp. 34-49, Jan.-Mar. 2009.
[4] L. Li, M. Li, and X. Cui, The Study on Mobile Phone-Oriented Application Integration Technology of Web Services, Proc. Int'1 Conf. Grid and Cooperative Computing (GCC), Apr. 2004.
[5] A. Halteren and P. Pawar, Mobile Service Platform: A Middleware for Nomadic Mobile Service Provisioning, Proc. IEEE International Conf. Wireless and Mobile Computing, Networking and comm... (WIMOB), 2006.
[6] Nicolas Guelfi, Egidio Astesiano, Gianna Reggio, Scientific Engineering of Distributed Java Applications (Third international Workshop, FIDJI 2003 Luxembourg-Kirchberg, Luxembourg, November 2003
[7] C. Wever, DynWsLib Tutorial, http://www.thinktecture.com/resources/software/ DynWsLib/default.html, 2011.
[8] R. Steele, K. Khankan, and T. Dillon, Mobile Web Services Discovery and Invocation through Auto-Generation of Abstract Multimodal Interface, Proc International Conf. Information Technology: Coding and computing (ITCC'05), vol.2, pp. 35-41, 2005.
[9] T.V. Raman, XForms: XML Powered Web Forms [ISBN: 0321154991].


Paper Type : Research Paper
Title : Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Country : India
Authors : S. L. Mhetre, Prof. M. M. Patil
: 10.9790/0661-1564953      logo

Abstract: In this paper two different methods for Numeral Recognition are proposed and their results are compared. The objective of this paper is to provide an efficient and reliable method for recognition of handwritten numerals. First method employs Grid based feature extraction and recognition algorithm. In this method the features of the image are extracted by using grid technique and this feature set is then compared with the feature set of database image for classification. While second method contains Image Centroid Zone and Zone Centroid Zone algorithms for feature extraction and the features are applied to Artificial Neural Network for recognition of input image. Machine text recognition is important research area because of its applications in many areas like Bank, Post office, Hospitals etc.
Keywords: Handwritten Numeral Recognition, Grid Technique, ANN, Feature Extraction, Classification.

[1] U. Bhattacharya and B. B. Chaudhuri, "Handwritten numeral databases of Indian scripts and multistage recognition of mixed numerals," IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 3, pp. 444–457, Mar. 2009.
[2] R. Plamondon and S.N. Srihari., 2000, "Online and off-line handwriting recognition: a comprehensive survey.", Pattern Analysis and Machine Intelligence, IEEE Transac-tions on, vol.22(1), pp 63–84.
[3] R. Jayadevan, Satish R. Kolhe, Pradeep M. Patil, and Umapada Pal, "Offline Recognition of Devanagari Script: A Survey," IEEE Transactions on Systems, man, and Cybernetics—part c: Applications and Reviews, vol. 41, no. 6, November 2011.
[4] I. K. Sethi and B. Chatterjee, "Machine recognition of hand printed Devanagari numerals," J. Inst. Electron. Telecommun. Eng., vol. 22, pp. 532–535, 1977.
[5] U. Bhattacharya and B. B. Chaudhuri, "Handwritten numeral databases of Indian scripts and multistage recognition of mixed numerals," IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 3, pp. 444–457,Mar. 2009.
[6] R. Bajaj, L. Dey, and S. Chaudhuri, "Devanagari numeral recognition by combining decision of multiple connectionist classifiers," Sadhana, vol. 27, no. 1, pp. 59–72, 2002.
[7] M. Hanmandlu, J. Grover, V. K. Madasu, and S. Vasikarla, "Input fuzzy modeling for the recognition of handwritten Hindi numerals," in Proc. Int. Conf. Inf. Technol., 2007, pp. 208–213.
[8] A. Elnagar and S. Harous, "Recognition of handwritten Hindi numerals using structural descriptors," J. Exp. Theor. Artif. Intell., vol. 15, no. 3,pp. 299–214, 2003.


Paper Type : Research Paper
Title : Computer aided environment for drawing (to set) fill in the blank from given paragraph
Country : India
Authors : Sheetal Rakangor, Dr. Yogesh Ghodasara
: 10.9790/0661-1565458      logo

Abstract:In this paper, we present Development of computer aided environment for drawing (to set) fill in the blanks that can generate for given paragraph. The System finds fill in the blanks, blanking key generates from the selected statement. Syntactic and lexical features are used in this process. NLP parser is used, part of speech taggers are applied on each of these sentences to encode necessary information. We present our work in designing and implementing the system which generate the blanks. The System is developed in Java using JDBC which is open source.
Keywords: Natural Language Processing NLP, Key selection, POS tagging, Sentence selection.

[1] Pollock, M.J., Whittington, C.D., Doughty, G.F.: Evaluating the Costs and Benefits of Changing to CAA. Proceedings of the Fourth International Computer Assisted Conference CAA, http://www.caaconference.com/. (2000).
[2] Wolfe, J.H.: Automatic question generation from text - an aid to independent study. SIGCUE Outlook 10(SI) (1976)
[3] Kunichika, H., Katayama, T., Hirashima, T., Takeuchi, A.: Automated question generation methods for intelligent english learning systems and its evaluation, Proc. of ICCE01 (2001).
[4] Manish Agarwal and Prashanth Mannem : Automatic Gap-fill Question generation from text books
[5] Simon Smith, P.V.S Avinesh and Adam Kilgarriff. 2010.Gap-fill Tests for Language Learners: Corpus-Driven Item Generation .
[6] Nikiforos Karamanis, Le An Ha and Ruslan Mitkov: Generating Multiple-Choice Test Items from Medical Text:A Pilot Study
[7] Naveed Afzal and Viktor Pekar: Unsupervised Relation Extraction for Automatic Generation of Multiple-Choice Questions.
[8] RUSLAN MITKOV, LE AN HA and NIKIFOROS KARAMANIS: A computer-aided environment for generating multiple-choice test items(2005)
[9] Le An Ha :Multiple-choice test item generation: A demo Vasile Rus, Brendan Wyse, Paul Piwek, Mihai Lintean, Svetlana Stoyanchev and Cristian Moldovan:The First Question Generation Shared Task Evaluation Challenge (2010)
[10] Husam Ali Yllias Chali Sadid A. Hasan: Automatic Question Generation from Sentences(2010).


Paper Type : Research Paper
Title : A Novel Interface to a Web Crawler using VB.NET Technology
Country : India
Authors : Deepak Kumar, Dr. Sushil Kumar, Narender Kumar
: 10.9790/0661-1565963      logo

Abstract: The number of web pages is increasing into millions and trillions around the world. To make searching much easier for users, web search engines came into existence. Web Search engines are used to find specific information on the World Wide Web. Without search engines, it would be almost impossible to locate anything on the Web unless or until a specific URL address is known. This information is provided to search by a web crawler which is a computer program or software. Web crawler is an essential component of search engines, data mining and other Internet applications. Scheduling Web pages to be downloaded is an important aspect of crawling. Previous research on Web crawl focused on optimizing either crawl speed or quality of the Web pages downloaded. While both metrics are important, scheduling using one of them alone is insufficient and can bias or hurt overall crawl process. This paper is all about design a new Web Crawler using VB.NET Technology.

Keywords: Web Crawler, Visual Basic Technology, Crawler Interface, Uniform Resource Locator..

[1] http://en.wikipedia.org/wiki/Web_crawler#Examples _of_Web_crawlers.
[2] http://www.chato.cl/papers/castillo04_scheduling_algorithms_web_crawling.pdf.
[3] http://ieeexplore.ieee.org/iel5/2/34424/01642621.pdf.
[4] http://citeseerx.ist.psu.edu/viewdoc/download?doi =10.1.1.1.9569&rep=rep1&type=pdf
[5] http://dollar.biz.uiowa.edu/~pant/Papers/crawling. pdf
[6] Marc Najork, Allan Heydon SRC Research Report 173, "High-Performance Web Crawling", published by COMPAQ systems research center on September 26, 2001.
[7] Sergey Brin and Lawrence Page, "Theanatomy of a large-scale hyper textual Web search engine", In Proceedings of the Seventh International World Wide Web Conference, pages 107–117, April 1998.
[8] [Ard¨o A]. (2005). "Combine Web crawler," Software package for general and focused Web-crawling. http://combine.it.lth.se/.
[9] Brin, S. and Page, L. 1998. The anatomy of a large-scale hypertextual Web search engine. In Proceedings of the Seventh international Conference on World Wide Web 7, 107-117
[10] Heydon, A. and Najork, M. 1999. Mercator: A scalable, extensible Web crawler. World Wide Web 2, 4 (Apr.1999), 219-229.


Paper Type : Research Paper
Title : Object Elimination and Reconstruction Using an Effective Inpainting Method
Country : India
Authors : Dharm Singh, Naveen Choudhary, Divya Kavdia
: 10.9790/0661-1566468      logo

Abstract: Three major problems have been found in the existing algorithms of image inpainting: Reconstruction of large regions, Preference of filling-in and Choice of best exemplars to synthesize the missing region. The proposed algorithm introduces two ideas that deal with these problems preserving edge continuity along with decrease in error propagation. The proposed algorithm introduces a modified priority computation in order to generate better edges in the omitted region and to reduce the transmission of errors in the resultant image a novel way to find optimal exemplar has been proposed. This proposal optimizes the reconstruction process and increases the accuracy. The proposed algorithm removes blurness and builds edges efficiently while reconstructing large target region.

Keywords: Image inpainting, texture synthesis, Image Completion, exemplar-based method.

[1]. M. Bertalmio, G. Sapiro, V. Caselles, and C. Ballester, Image inpainting, in SIGGRAPH, (2000).
[2]. A. Bugeau, M. Bertalmio, V. Caselles, and G. Sapiro, A comprehensive framework for image inpainting, IEEE Transactions on Image Processing, vol. 19, no. 10, pp. 2634 –2645, Oct.(2010).
[3]. A. Criminisi, P. Perez and K. Toyama, Region filling and object removal by exemplar-based image inpainting, IEEE Transactions on Image Processing, 13(9), 1200-1212, (2004)
[4]. Jiying Wu, Qiuqi Ruan and Gaoyun An Exemplar-based image completion model employing PDE corrections, Informatic, 21(2), 259-276, (2010).
[5]. Efros and T. K. Leung, Texture synthesis by nonparametric sampling, in Proceedings of International Conference on Computer Vision, pp. 1033-1038 (1999).
[6]. A. Efros and W. F. Freeman, Image quilting for texture synthesis and transfer, in Proceedings of ACM Conference in Computer Graphics, pp. 341-346(2001)
[7]. Zhanming Li and Wenjin Hu, A Novel Method for Exemplar-based Image Inpainting, Journal of Information & Computational Science 9: 761–769, (2012).
[8]. Aurelie Bugeau and Marcelo Bertalmio, Combining Texture Synthesis and Diffusion for Image Inpainting, Proceedings of the Fourth International Conference on Computer Vision Theory and Applications VISAPP, Portugal (2009).
[9]. R. Martınez-Noriega, A. Roumy and Inria Santander, Exemplar-Based Image Inpainting: Fast Priority and Coherent Nearest Neighbor Search, IEEE International Workshop on Machine Learning for Signal Processing, Spain, Sept. 23–26 (2012).
[10]. Qing Zhang and Jiajun Lin, Exemplar-Based Image Inpainting Using Color Distribution Analysis, Journal of Information Science and Engineering 28, 641-654 (2012).


Paper Type : Research Paper
Title : Virtual Community in Interactive Teaching: Five Cases
Country : India
Authors : Subhenur Latif, Narayan Ranjan Chakraborty
: 10.9790/0661-1566975      logo

Abstract: Modern teaching methods demand innovative and effective use of technology at utmost level. Incorporating a virtual community outside classroom teaching has become inevitable in digital age education. This research was intended to find out how this can be used in terms of interactive teaching and how it can facilitate students to recover the lacks of learning in classroom. A web community of a university called Learning Feedback System (LFS) has been used here as the methodology to analyze five sample cases. Effects of a significant level of interaction in LFS indicated that it helped to reduce the communication gap between students and teachers that of course leading to proper learning.

Keywords: ICT, Interactive teaching, LFS, Technology education, Virtual Community.

[1] Subhenur Latif and M Lutfar Rahman."Improving Skills by Peer Learning through Web Technology".National Conference on Teaching Learning at Tertiary Level in Bangladesh, December, 2011.
[2] Ben McNeely.Using Technology as a Learning Tool, Not Just the Cool New Thing, Educating the Net Generation, February 2005. [3] Yousuf Islam. "Tertiary Education in Bangladesh – Brief History, Problems and Prospects", International Journal for the Scholarship of Teaching and Learning, Vol. 5, No. 2, pp-4, July 2011.
[4] Jalal and Zaidieh. "The Use of Social Networking in Education: Challenges and Opportunities".World of Computer Science and Information Technology Journal (WCSIT).Vol. 2, No. 1, 18-21, 2012.
[5] Brandtzaeg, PetterBae & Heim, Jan; (2007). Initial context, user and social requirements for the Citizen Media applications: Participation and motivations in off- and online communities.Citizen Media Project.
[6] Dorum, Bartle, Pennington. "The Effect of Online Social Networking on Facilitating Sense of Belonging among University Students Living Off Campus".World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA) 2010. Toronto, Canada. June 29, 2010.

[7] Silius, Miilumäki, Huhtamäki, Tebest, Meriläinen, Pohjolainen. Social Media Enhanced Studying and Learning in Higher Education. IEEE EDUCON Education Engineering, Madrid, Spain, April 14-16, 2010.

[8] Madge, C., Meek,J., Wellens, J. & Hooley, T. (2009). Facebook, social integration and informal learning at university: 'It is more for socialising and talking to friends about work than for actually doing work'. Learning, Media and Technology, 34(2), 141 – 155.

[9] 2013.University of the Sciences Website. [Online]. Available: http://www.usciences.edu/teaching/tips/spal.shtml.

[10] Patrício and Gonçalves. "Facebook In The Learning Process: A Case Study". Proceedings of ICERI, 2010 Conference.15th-17th November 2010, Madrid, Spain.



IOSR Journals are published both in online and print versions.