1. ANN AND SOME DATA MINING METHODS FOR CATEGORIZATION AND LEARNING IMPROVEMENT IN ITS

Sami Ahmed Mohammed Al Radaei,Asst. Prof., Department of Computer Science, Hajjah University, Hajjah-Yemen

Abstract:

Different learning strategies have been used to improve the learning during the learning process. The learners’ performance in Intelligent Tutor System (ITS) is considered as a tool to evaluate the learners’ achievements and knowledge. The problem of categorizing the learners on the basis of their performances is one of the important issues in ITS. ANN and Data mining have been widely used for solving the classification problems. In this paper a strategy for improving the learning process has been presented. The categorization of the learners into different types i.e. Average, Good, Very Good, Excellent and Outstanding, using ANN and data mining methods has been made and calculation of the relative importance of each test type is done.

2. AN EFFICIENT APPROACH TO DETECT OBJECT, EDGE AND COLOUR PALETTE RECOGNITION FOR SURVEILLANCE BASED APPLICATIONS

Aditya Khamparia, Asst. Prof., School of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab

Babita Pandey, Asso. Prof., School of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab

Vikas Pardesi, , Asst. Prof., School of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab

Narendra Kumar Bagde, Asst. Prof., School of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab

Abstract:

This paper proposed an effective approach for the detection of small objects and edges using some scale invariant feature transform and algorithmic based transformations. In this work, moving objects with small size and low contrast are first detected from an image sequence which was captured from a video camera. Here we proposed an implemented algorithm SIFT (Scale Invariant Feature Transform) which is going to be use is based on key points, SIFT’s ability is to find distinctive key points that are invariant to location, scale & rotation, robust to affine transformations (changes in scale, rotation, shear, and position) and changes in illumination, they are usable for object recognition. The proposed method takes advantage of local feature to deal with rapid camera motion, and employs an feature updating scheme to cope with variation in object appearances.

3. MULTI-AGENT NEGOTIATION STRATEGIES IN B2B E-COMMERCE SYSTEM

Swati Basak ,Asst. Prof., Dept. of Computer Science, SITM, Lucknow, India

Babu Ram, Research Scholar, Department of Computer Engs., SITM, Lucknow

Abstract:

In MAS, an agent is a software program that acts flexibly on behalf of its owner to achieve particular objectives. MAS have also been used to represent the clients and sellers / developers as agents and the broker as a coordinator agent. In this model the job of the coordinator agent is to take the required items from the client agent and to find out the proper, best and trusty seller / developer agents who can supply the items to satisfy the trust of client agent and constraints on the requirement of the client agent as well as on the seller / developer agents in supply of the items. We have shown the application of this method for the purchase domain in agent’s coordination and cooperative system. The selection of developer agent is based upon his cognitive, social and trust characteristics. The client agent has set of requirements of items for which it needs some best and trusty developer agents. We first examined a search for the index of negotiation of the developer as a mechanism to find a compromise between the histories of different developer agents. This mechanism helps to evaluate a good solution to fulfill all the requirements of client agent and the best (potential) developer agent is selected by client agent for doing business in B2B E-Commerce System.

4. HIGHLIGHTING CHANNEL CONFLICTS : A CASE STUDY OF NIKE

Abhishek Tripathi, Research Scholar, University of Nebraska, Omaha, NE 68106

Satish M. Srinivasan, Asst. Prof., University of Nebraska Medical Center, Omaha

Abstract:

Nike led by Phil Knight, one of the fortune 500 companies, focuses on making high-performance athletic shoe. In 1999, after 35 years Nike was born, it became the world’s dominant athletic footwear and apparel company. Before 1999, Nike was a B2B company and had very few retailers selling their products to the customers. Earlier Nike concentrated only on their brand management and advertising and its intention behind brand management was to make customer experience their product and feel the pleasure of being a winner. But after 1999, with the emergence of their official site nike.com, Nike became a B2C company. In addition to nike.com, there were other web sites like nikelab.com, nikegoddess.com etc. that tried to advertise the new innovative product line developed by the Nike. Still today, Nike uses its web site as another medium for brand management and advertising. As Nike went to become a B2C company in addition to being a B2B it opened up unmanageable channels leading to channel conflicts thus hurting its brand value. This case study will discuss the Nike’s business model, its value chain and provide recommendations on how Nike can resolve its channel conflicts and remain forever a company that has always excelled in making their customers experience their product and feel the pleasure of being a winner.

5. 2-D SHAPE RECOGNITION OF THE OBJECT FOR THE ROBOTICS APPLICATIONS

Akash D. Dubey, Asst. Prof., College of Engineering, Science and Technology Fiji National University, Lautoka

R.B.Mishra, Prof., Dept. of Computer Engineering, Indian Institute of Technology (BHU), Varanasi, India

Abstract:

In order to decide the path of the mobile robot, the most important criteria are to decide the location of the object and its shape for grasping by the end effector. The shape recognition of the object can be done by different methods and it involves two basic categories: 2D and 3D shape recognition. Whereas in 2D, the two dimensional shape (rectangular, triangular and circular) is determined, in 3D shape recognition, the three dimensional shape of the object is detected for example cubical shape. The shape recognition of the object is useful in order to decide the pressure that the end effector has to exert on the object to pick it and subsequently, place it to the destination. In this paper, we have implemented a method to decide the two dimensional shape of the object placed in the environment whether it is rectangular, circular or triangular.

6. DEPENDENCE CACHE SLICING – A CASE STUDY

Raj Singh, Ph.D. Research Scholar, Jodhpur National University, Jodhpur, Rajasthan, India

Bireshwar Dass Mazumdar, Asst. Prof., SMS Varanasi

Abstract:

Various program slicing techniques with different types of graphs and comparison amongst all has been discussed in numerous papers. One of the techniques is Dependence-cache slicing which overcomes the major limitation of other techniques by making caches for each variable. This paper focuses on dependence cache slicing and discusses its betterment by comparing it with all other basic techniques which is proved with the help of case study. During the analysis, the execution time length and better size slicing is found and experimentally calculated, best result were obtained at dependence cache slicing.

7. EFFECTIVENESS OF E-LEARNING PACKAGE FOR LECTURE METHOD IN TEACHING

Prashish Khare, Research Scholar, Department of Education, University of Allahabad,

Dhananjai Yadav, Prof., Department of Education, University of Allahabad, Allahabad

Abstract:

e-learning is growing field and every field of society is attached with it. In present scenario researcher tries to find out effectiveness of an e-learning package, related with lecture method of teaching. In this paper, researcher tries to see the effectiveness in context of cognitive domain of blooms taxonomy of educational objectives. Researcher find it that e-learning package is effective.

8. ANALYSIS OF A DYNAMIC LOAD BALANCING MODEL IN GRID ENVIRONMENT

Shikha Gautam, Research Scholar, Dept. of Computer Science, SITM LKO

Anand Prakash Dube, Asst. Prof., Department of Computer Applications, SMS, Varanasi

Abstract:

Grid technology has emerged as a new way of large-scale distributed computing with high-performance orientation. Grid computing is being adopted in various areas from academic, industry research to government use. Grids are becoming platforms for high performance and distributed computing. Grid computing is the next generation IT infrastructure that promises to transform the way organizations and individuals compute, communicate and collaborate. The goal of Grid computing is to create the illusion of a simple but large and powerful self-managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources. Dynamic load balancing is an important factor affecting the parallel computing performance in a multiprocessor system. On the basis of an introduction to the basic principle of dynamic load balancing algorithm, this paper first finds through analysis that the basic reason for overhead occurring in load balancing is the load migration, and then qualitatively gives the granularity formula of moving load each time, proposes a new dynamic load balancing algorithm, defines the four possible states of the node, and discusses the implementation rule of the algorithm. Grid Resource Management is defined as the process of identifying requirements, matching resources to applications, allocating those resources, and scheduling and monitoring Grid resources over time in order to run Grid applications as efficiently as possible. Resource discovery is the first phase of resource management. Scheduling and monitoring is the next step. Scheduling process directs the job to appropriate resource and monitoring process monitors the resources. The resources which will be heavily loaded will act as server of task and the resources which are Lightly Loaded will act as receiver of task. Task will be migrated from heavily loaded node to lightly loaded node.

© 2015, School of Management Sciences | All rights reserved.

MANDATORY DISCLOSURE | WEBMAIL | Chat Live