IJCSWS-Menu
IJCSWS - Volume :08 Issue:02
Page No |
Title
|
---|
1-5 |
Using Cloud Computing Technologies for Improvement E-Learning System in University of Diyala --Mohammed Layth Talal, Ali Ahmed Ali, Aymen Mudheher Badr |
Abstract
In the last period, Information Technologies (IT) plaied an effective role in the field of Learning where e-learning system has become a trend very common of the learning technology. Nevertheless, with the massive growth of the users’ number, educational resources and data produced, e-learning systems has become more expansive in terms of software resources and hardware, as well as many educational institutions in Iraq cannot afford like ICT infrastructures. Given its enormous advantages, cloud computing technology rises quickly as a natural platform to support e-learning systems. This paper attention on the role of cloud computing applications in e-learning. The objective of this paper is to give an impression of the impact of the use of cloud computing for e-learning and current state. So that, the paper presents cloud computing infrastructure and concepts of e-learning. The paper studies also challenge facing e-learning systems in various educational institutions. Therefore, cloud computing applications benefits are introduced as a solution for these challenges. At last, the paper gifts some solutions of cloud computing applications in e-learning and describes the best tools and means adopted. Issues in execution some potential ways and cloud-based e-learning systems to overcome them are also discussed. Keywords: E-learning. Cloud computing. IT. ICT. ![]() |
6-12 |
YouTube: Comments Spam Review Detection and Spam Filtering by Using the Linguistic Methods (SRD-LM) --Bhavadhaarani A, Beula Kutti M |
Abstract
In recent years, the spam review detection problem has gained much attention from communities and researchers, but still there is a need to perform experiments on real-world large-scale review datasets. With the raised quality of on-line social networks, spammers realize these platforms simply accessible to lure users in malicious activities by posting spam messages. This can help to analyze the impact of widespread opinion spam in online reviews. In this work, we took comments from YouTube and made YouTube spam detection. Google Safe Browsing and YouTube Bookmaker detect and block YouTube spammers to avoid spammers. These tools block malicious connections, but they can't secure the user as soon as possible in real time. Industries and researchers have therefore used entirely different ways of building a spam-free social network platform. Some of them are only user-based options supported, while others are only supported by YouTube. Spam Review Detection using Linguistic Method (SRD-LM) works on the content of the reviews and utilizes transformation, feature selection and classification to identify the spam reviews. We can achieve 91.65 percent accuracy with the Neural Network and have exceeded the current solution by around 18 percent. The most common learning methods in the fields of spam filtering (Bayesian classification, K-NN, ANN, SVM) and their application. Keywords: YouTube Comments reviews, spam reviews, spam review detection, linguistic features, spammer behavioral features. ![]() |
13-21 |
Online Public Shaming Detection on Twitter Using Machine Learning Approach and Polarity Predication --Saraswathi J, Sarala V |
Abstract
Sarcasm is a refined type of irony, used on social networking sites like Facebook and Twitter and microblogs. Typically, it is employed to impart tacit knowledge in a message. It is typically used to communicate implicit knowledge within an individual's message. For various reasons, such as criticism or satire, sarcasm can be used. But it's hard to remember even for humans. Consequently, it can be very helpful to recognize sarcastic comments in order to automatically increase feelings of data gathered from microblogging websites or social networks. Sentiment Analysis refers to the detection and compilation of Internet users' attitudes and views on a particular topic. In this article, we suggest a model-based method for detecting Twitter sarcasm. We offer four sets of features covering the various sarcasm forms that we have identified. We use tweets to describe sarcastic and non-sarcastic tweets. Our method proposed achieves a precision of 83.1% with a precision of 91.1%. We also investigate the meaning and importance of each of the suggested sets of characteristics. We stress the importance of pattern-based characteristics to identify sarcastic statements in particular. Keywords:Twitter, sentiment analysis, sarcasm detection, machine learning. ![]() |
22-27 |
Food Waste Management --Samay Raj, Anmol Kushwaha, Amit Kashyap, Ranjan Pandey, Shubham Kumar |
Abstract
Every year millions of people perish in hunger and tonnes of food gets wasted. We a group of four members, through this proposed work, have attempted to bridge this gap by making food available to those who are in need and at the same time preventing the wastage of food. According to the food and agriculture organization, one third of the total food produced gets wasted. This wastage account for 1.3 billion tones and the scarcity of food is one of the major concerns globally. With the intention of providing food security to the widest people possible, we have taken a small step towards the distribution of food and money to needy people, which when joined by more volunteers, will make a planet where no person sleeps empty stomach. Keywords:Food waste, Donate food, Donate Money Html, CSS ,Php, JavaScript, Bootstrap. ![]() |
28-30 |
ACADAURA: Soul of the University --Aman Tripathi,Rupesh Ubale,Mukesh Prajapati,Abhishek Pratap Singh,Aman Kumar Yadav |
Abstract
In recent time, world faced a pandemic who literally stopped the world. Hence schools and colleges stopped. But we can't afford this much academic loss of the youth of our nation. So, we all switched to online mode. But switching to online was not that much easy, Today's schools and colleges got to manage more information than ever before. The fundamental goal of this capstone project is to give a stage that will deal with all exercises and cycles. This kind of platforms are coming very handy to big universities but our aim is to make available Acadaura to all small collages/ coaching classes/ government schools. This article will highlight the contribution of the creators, urgent need of the platform, features and scope of the platform in upcoming time. Keywords:Pandemic, Covid-19, Acadaura, University- management, Small collages, Government schools, Research. ![]() |
31-34 |
Reviewing The Web Crawling Techniques --Vivek Kumar, Harsh Sharma, Chirag Prasher, Arnav Thakur |
Abstract
A page rank is certain to determine the impact of a given page across its peers, it is also certain of the number of outlines rising from a page and its relevance with the keywords searched. This paper sheds light on the use of multiple web tools available in the market for web crawling which help in searching for information across various collective pages and retrieve vast information according to the terms searched for. The page in this paper, individual page crawlers are defined for an adjusted PageRank calculation and a PR-score is set to measure the influence of the solitary article using its near co-reference organization. It has also explored probability and RP - the score of a paper starting on a subjective article of its co-reference network for a similar reason. Keywords:Web crawling, PageRank algorithm, data searching, python-based web tools. ![]() |
35-38 |
ASK LPU: A Mobile Application Search Engine --Md Irshad Ahmad,Md Absar Nayyar,Sudhanshu Shekhar,Mohmmad Aakid Khan |
Abstract
With the popularity of mobile apps on mobile devices based on iOS, Android, Blackberry and Windows Phone operating systems, the number of mobile apps in each of the respective native app stores are increasing in leaps and bounds. Currently there are almost 700,000 mobile apps across these four major native app stores. Due to such enormous number of apps, both the constituents in the app ecosytem, consumers and app developers, face problems in terms of ‘app discovery’. For consumers, it is a daunting task to discover the apps they like and need among the huge number of available apps. Keywords:Mobile App, Search Engine, XML , JAVA. ![]() |
39-43 |
Artificial Intelligence-based Virtual Assistant --Harshita Yadav, Ravi Teja Nandam, Sonu Lamban |
Abstract
Artificial Intelligence-based Virtual Assistance is a software agent which can perform an individual’s tasks or services according to instructions or the command given by a user. The term "chatbot" is sometimes used to refer to assistants who are generally visible or particularly accessible through online chat. [2]A chatbot can be described as software that communicates with people using artificial intelligence. This software is used to perform tasks such as responding quickly to users, informing them, helping to purchase products, and providing better customer service. Now it has become a major growth factor that is changing the comfort of people. Some Virtual assistants can interpret a person's speech and respond with integrated voices. Users can ask questions to the assistants, detect drowsiness of user, and can manage other basic functions such as email, to-do lists, and calendars with verbal commands. Keywords:Chatbot, Virtual Assistance, AI-based Drowsiness detection, Automatic speech recognition. ![]() |
44-47 |
Object Detection --Lalith Vardhan.M, Raja Rameshwar, Prasanna Raju.D |
Abstract
Based the analysis of error back propagation algorithm, with images, object are becoming the fast growing information object detection has become a major necessity to speed up the process for business, daily life and play major role in the technology of self-driving cars so that people around can drive safely. Object detection is a technique that recognize objects through android application and let us know about it or it detects the live image and classifies the image and provide the output of the following image in mobile screen. The project object detection depends on machine learning, deep learning and python. In machine learning we have used tensor flow software to implement machine learning algorithm.. Keywords:CNN; Tensorflow software; Keras; Android studios; FPS;. ![]() |
48-50 |
Behavioural Study Of Animals --Uppu Anil Kumar, Cheemala Sreekanth Reddy |
Abstract
The study of natural systems is greatly influenced by findings from complex systems studies. The outline of dynamic simulation and forming interaction for a complex system has advanced natural environment implementation strategies. We proposed a system which is closer to the natural adaptive system. Interactions that happen day-to-day among various animal species versus the population change is highlighted. Multiple species behavioural patterns are analysed and integrated into the system to match the real-world scenarios. The thing to note here is, with the limited technological resources we are able to plot the data in a discrete time scale. The model that we’ve developed now consists of animals only but the same can have even more animals. The more the sub-interactions that we consider the better the model can predict. With the current model, we are able to produce a decent accuracy with the technological and research data limitations. Adapting to the environment with all the odd situations which normally happens in a natural environment, can improve the chances of survival rate. Keywords:Behavioral study, System modelling, Population dynamics. ![]() |
51-53 |
Working Of Steganography As A Software --Prakash Deep Sharma, Edla Gnaneswar Reddy |
Abstract
Steganography is the art of concealing the fact that contact is taking place by enclosing data in other data. There are several different carrier file formats that can be used, but audio is the most popular. Because of their prevalence on the Internet, they are very common. There are several stenographic methods for concealing sensitive information in audio files. Others are more nuanced than others, and each has its own set of strengths and weaknesses. The steganography technique used for various applications has different specifications. techniques. It also supports image and video steganography. For a more secure approach, the project encrypts the message with a hidden key before sending it to the recipient. The receiver then decrypts the message to get the original. Keywords:Steganography,Human auditory system,hiding secret information. decrypts the message ![]() |
54-59 |
Peer Learning: A Better Learning Option in COVID-19 Pandemic --Chitrak Vimalbhai Dave, Ravi Prakash Gupta, Abhishek Patel,Aarav Mahavaryaa |
Abstract
Classroom lectures are often considered the most important and effective learning method around the world. But there are many disadvantages of this method especially in this time of COVID-19 pandemic. There is a better option available called peer learning. Peer learning means learning from others, who have the same age, status or ability as another specified person, has become an important part of education. It simply means learners teaching learners. Peer learning is a better and more efficient option than traditional learning in this pandemic. This study shows that students can benefit from peer learning as it increases their confidence level and decreases anxiety. But it requires adequate academic supervision to be effective in its purpose. We, a group of four people through our proposed work, attempted to provide an online peer learning portal.. Keywords:Peer Learning, Traditional Learning, Peer Students, Peer Teachers, Traditional Learning Methods, COVID-19 Pandemic ![]() |
60-62 |
DropIt Android chat Application
--Viresh kumar, Abhishek Hatwar |
Abstract
In the world of internet, talking to each other via internet has been growing at a fast rate. Talking through internet basically means using chat applications like Facebook, Instagram and whatsapp to talk to each other. The proposed DropIt application will not let the users send inappropriate messages. This paper proposes the mechanism of DropIt application by generating code and use that code to enter into the chat window, this makes sure that the users outside who don’t have the code generated by the host will not be able to enter into the chat window.In this application the host who want to have a conversation with a group of people can use the code generation feature of the application and sent the code to the people whom he or she wants to have conversation with. The participants can use the provided code to enter into the chat window. Every time a new chat window will be opened to talk to the participants. Keywords:Android application, chatting app , Java , lock mechanism ![]() |
Remaining articles under review process