Journal Vol – 15 No -3, March 2020

ANALYTICAL ASSESSMENT OF NOUN VERB TERM EXTRACTION FOR DOCUMENT CLASSIFICATION USING T-TEST

Authors:

Omaia Mohammad Al-Omari, Nazlia Omar

DOI NO:

https://doi.org/10.26782/jmcms.2020.03.00021

Abstract:

There has been a significant growth in the digital word as per the documents are concerned. The classification of digital document is a big trend in the market as a revolution. However the classification of the document is a big task for the modern applications. There are various terms that are used for the extraction of information from the documents. The main concerned areas for the document classification are the noun and the verbs that broadly signify the topics and events. The use of NV (Noun Verb) techniques is a common and powerful practice for the words to be classified.  The performance of the document depends on the NV technique due to the classification of the document. The main aim of the work shown in this study is to enhance the capability of the NV extraction methodology to classify the documents. Three classifiers namely, K-Nearest Neighbor (KNN), Naive Bayes (NB), and Support Vector Machine (SVM) are used for the comparison of the results. Various benchmark set are used in this study for the evaluation of the accuracy of the data sets. The data sets were taken from Reuters 8 and WebKb for this purpose. Other extraction methods were also enhanced and incorporated with the NV method extraction e.g., Nouns, Bag of Word (BOW), and Verbs. The results are studied and the conclusion follows them

Keywords:

BOW extraction,Document classification,NV extraction,KNN classifier,NB classifier,SVM classifier,

Refference:

I. Apoorva Deshpande, Ramnaresh Sharma, Multilevel Ensemble Classifier using Normalized Feature based Intrusion Detection System, International Journal of Advance Trends in Computer Science and Engineering, Vol 7, No.5, September -October 2018.
II. Bsoul, Q., &Salim, Z. 2016. Effect Verb Extraction on Crime Traditional Cluster, world applied science journal.
III. Cambria, E., & White, b. 2014. Jumping NLP Curves: A Review of Natural Language Processing Research. IEEE Computational Intelligence Magazine, 9(1): 48-57.
IV. Ding, X. & Tang, Y. 2013. Improved Mutual Information Method For Text Feature Selection. The 8th International Conference on Computer Science & Education. IEEE, pp: 163-166.
V. Dyer, M. 1995. Connectionist natural language processing: a status report. in Computational Architectures Integrating Neural and Symbolic Processes, Sun and L. Bookman, Eds. Dordrecht. The Netherlands: Kluwer Academic, 292(1):389–429.

VI. Fodeh, S., Punch, W. & Tan, P. 2011. On ontology-driven document clustering using core semantic features. On ontology-driven document clustering using core semantic features, Journal of KnowlInfSyst, Springer-Verlag London. 28(2): 395-421.
VII. Guru, S., Suhil, M., Raju, N., & Kumar, V., An Alternative Framework for Univariate Filter based Feature Selection for Text Categorization. Pattern Recognition Letters. 2018. https://doi.org/10.1016/j.patrec.2017.12.025
VIII. Hotho, A., Staab, S., &Stumme, G. 2003. WordNet improves text document clustering. In Proc. of the SIGIR 2003 Semantic Web Workshop, pp: 541-544.
IX. International Journal of Advanced Trends in Computer Science and Engineering, Volume 8, No.1, January – February 2019. Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse15812019.pdf https://doi.org/10.30534/ijatcse/2019/15812019
X. Kummer, O., Savoy, J., &Argand, E. 2012. Feature selection in sentiment analysis.
XI. Lewis, D. 1997. Reuters-21578 text categorization test collection. AT&T Labs Research.
XII. Liu, Xin&Beyrend-Dur, Delphine&Dur, Gael & Ban, Syuhei. (2014).
XIII. OumaymaOueslati, Ahmed Ibrahim S. Khalil, Habib Ounelli, Sentiment Analysis for Helpful Reviews Prediction, International Journal of Advance Trends in Computer Science and Engineering, Vol 7, No.3, May – June 2018
XIV. Porter, F. 1997. An algorithm for suffix stripping in K. Sparck Jones, P. Willett (1st Eds) Readings in Information Retrieval, Morgan Kaufmann Multimedia Information and Systems Series, pp: 313–316.
XV. Rogati, Monica & Yang, Yiming. 2002. High-performing feature selection for text classification. 659. 10.1145/584902.584911.
XVI. Yao, H., Liu, C., Zhang, P., & Wang, L. 2017. A feature selection method based on synonym merging in text classification system. Journal on Wireless Communications and Networking. Springer. pp: 1-8.

View Download

INTERNET OF THINGS (IOT) BASED EDUCATIONAL DATA MINING (EDM) SYSTEM

Authors:

Nayyar Ahmed Khan, Rund Fareed Mahafdah, Omaia Mohammad Al-Omari, Samia Dardouri, Ahmed MasihUddinSiddiqi, Mohammad Ahmad Mohammad Nasimuddin

DOI NO:

https://doi.org/10.26782/jmcms.2020.03.00022

Abstract:

Internet of Things (IoT) is an emerging trend in the field of technology, which has derived a lot of attention in the recent years. The ability of this technology for reducing the burden and strain on the education or academic system makes it possible for deriving a potential and raising the standards of academics. This study proposes a standard model for the educational system with the help of IoT. This paper gives an IoT based modal for the student engagement till the industry institute linkage plan. It gives a design in which the monitoring of RFID based data can be done and results could be discovered using the IoT techniques for the further selection criteria of industries. The results for any student shall be updated and made available based on the student data and business intelligence can be applied to the university system for giving the industry for best students. The study tries to relate various components which are later for the model generation, including the strength, weaknesses, opportunities and threats for a wearable IoT university system. A lot of challenges are based by the field of academics and University’s as far as security and privacy is concerned. Future direction in the research can be derived from the existing proposed model in the study.

Keywords:

IoT,e-learning,computational learning,System Adaption,Security,privacy,challenges,smart devices,sensors-based devices,

Refference:

I. Ansari, A.N., et al. Automation of attendance system using RFID, biometrics, GSM Modem with. Net framework. in Multimedia Technology (ICMT), 2011 International Conference on. 2011. IEEE.
II. Baradwaj, B.K. and S. Pal, Mining educational data to analyze students’ performance. arXiv preprint arXiv:1201.3417, 2012.
III. Bevitt, D., C. Baldwin, and J. Calvert, Intervening early: Attendance and performance monitoring as a trigger for first year support in the biosciences. Bioscience Education, 2010. 15(1): p. 1-14.
IV. Bsoul, Q., & Salim, Z. 2016. Effect Verb Extraction on Crime Traditional Cluster, world applied science journal.
V. Cambria, E., & White, b. 2014. Jumping NLP Curves: A Review of Natural Language Processing Research. IEEE Computational Intelligence Magazine, 9(1): 48-57.
VI. Chawathe, S.S., et al. Managing RFID data. in Proceedings of the Thirtieth international conference on Very large data bases-Volume 30. 2004. VLDB Endowment.
VII. Cleveland, B.W., Engaging spaces: Innovative learning environments, pedagogies and student engagement in the middle years of school. 2011: University of Melbourne, Faculty of Architecture, Building and Planning.
VIII. Darcy, P., B. Stantic, and A. Sattar. Applying a neural network to recover missed RFID readings. in Proceedings of the Thirty-Third Australasian Conferenc on Computer Science-Volume 102. 2010. Australian Computer Society, Inc.
IX. Darcy, P., S. Tucker, and B. Stantic, Integrating RFID technology with intelligent classifiers for meaningful prediction knowledge. Advances in Internet of Things, 2013. 3(2): p. 27-33.
X. Ding, X. & Tang, Y. 2013. Improved Mutual Information Method For Text Feature Selection. The 8th International Conference on Computer Science & Education. IEEE, pp: 163-166.
XI. Doyle, L., et al., An evaluation of an attendance monitoring system for undergraduate nursing students. Nurse education in practice, 2008. 8(2): p. 129-139.
XII. Dyer, M. 1995. Connectionist natural language processing: a status report. in Computational Architectures Integrating Neural and Symbolic Processes, Sun and L. Bookman, Eds. Dordrecht. The Netherlands: Kluwer Academic, 292(1):389–429.
XIII. Ferreira, D.D.J.S.S.F.B.V., Knowledge and technology transfer between university — Industry — Society: A new crowdsourcing framework for Internet of Things, in Microwaves, Antennas, Communications and Electronic Systems (COMCAS), 2017 IEEE International Conference, IEEE, Editor. 2017, IEEE Explore: Tel-Aviv, Israel.
XIV. Fodeh, S., Punch, W. & Tan, P. 2011. On ontology-driven document clustering using core semantic features. On ontology-driven document clustering using core semantic features, Journal of KnowlInfSyst, Springer-Verlag London. 28(2): 395-421.
XV. Gershenfeld, N., R. Krikorian, and D. Cohen, The internet of things. Scientific American, 2004. 291(4): p. 76-81.
XVI. Halibas, A.S., I.G. Pillai, and A.C. Matthew. Utilization of RFID analytics in assessing student engagement. in Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), 2017 2nd International Conference on the. 2017. IEEE.
XVII. Hanna, M., Data mining in the e-learning domain. Campus-wide information systems, 2004. 21(1): p. 29-34.
XVIII. Hotho, A., Staab, S., &Stumme, G. 2003. WordNet improves text document clustering. In Proc. of the SIGIR 2003 Semantic Web Workshop, pp: 541-544.
XIX. Hughes, G. and C. Dobbins, The utilization of data analysis techniques in predicting student performance in massive open online courses (MOOCs). Research and Practice in Technology Enhanced Learning, 2015. 10(1): p. 10.
XX. Jeffery, S.R., M. Garofalakis, and M.J. Franklin. Adaptive cleaning for RFID data streams. in Proceedings of the 32nd international conference on Very large data bases. 2006. VLDB Endowment.
XXI. Jindal, N. and B. Liu. Mining comparative sentences and relations. in AAAI. 2006.
XXII. Jing, B.-Z., et al. RFID access authorization by face recognition. in Machine Learning and Cybernetics, 2009 International Conference on. 2009. IEEE.
XXIII. Jones, K., J. Thomson, and K. Arnold, Questions of data ownership on campus. 2014.
XXIV. Kassim, M., et al. Web-based student attendance system using RFID technology. in Control and System Graduate Research Colloquium (ICSGRC), 2012 IEEE. 2012. IEEE.
XXV. Kummer, O., Savoy, J., & Argand, E. 2012. Feature selection in sentiment analysis.
XXVI. Lewis, D. 1997. Reuters-21578 text categorization test collection. AT&T Labs Research.Matthew, A.S.H.I.G.P.A.C., Utilization of RFID analytics in assessing student engagement, in Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), 2017 2nd International Conference, IEEE, Editor. 2017, IEEE: Amman, Jordan.
XXVII. Li, D.-Y., et al. Design of Internet of Things System for Library Materials Management using UHF RFID. in RFID Technology and Applications (RFID-TA), 2016 IEEE International Conference on. 2016. IEEE.
XXVIII. Lim, T., S. Sim, and M. Mansor. RFID based attendance system. in Industrial Electronics & Applications, 2009. ISIEA 2009. IEEE Symposium on. 2009. IEEE.
XXIX. Liu, Xin&Beyrend-Dur, Delphine&Dur, Gael & Ban, Syuhei. (2014).
XXX. Mihăescu, C., et al. Learning analytics solution for building personalized quiz sessions. in Carpathian Control Conference (ICCC), 2017 18th International. 2017. IEEE.
XXXI. Porter, F. 1997. An algorithm for suffix stripping in K. Sparck Jones, P. Willett (1st Eds) Readings in Information Retrieval, Morgan Kaufmann Multimedia Information and Systems Series, pp: 313–316.
XXXII. Rogati, Monica & Yang, Yiming. 2002. High-performing feature selection for text classification. 659. 10.1145/584902.584911.
XXXIII. Romero, C. and S. Ventura, Data mining in education. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2013. 3(1): p. 12-27.
XXXIV. Romero, C., et al., Web usage mining for predicting final marks of students that use Moodle courses. Computer Applications in Engineering Education, 2013. 21(1): p. 135-146.
XXXV. Srinidhi, M. and R. Roy. A web enabled secured system for attendance monitoring and real time location tracking using Biometric and Radio Frequency Identification (RFID) technology. in Computer Communication and Informatics (ICCCI), 2015 International Conference on. 2015. IEEE.
XXXVI. Teague, D.M. and M.W. Corney, Is anybody there? Bootstrapping attendance with engagement. 2011.
XXXVII. Welbourne, E., et al. Challenges for pervasive RFID-based infrastructures. in Pervasive Computing and Communications Workshops, 2007. PerCom Workshops’ 07. Fifth Annual IEEE International Conference on. 2007. IEEE.
XXXVIII. Wu, D.-L., et al. Access control by RFID and face recognition based on neural network. in Machine Learning and Cybernetics (ICMLC), 2010 International Conference on. 2010. IEEE.
XXXIX. Yao, H., Liu, C., Zhang, P., & Wang, L. 2017. A feature selection method based on synonym merging in text classification system. Journal on Wireless Communications and Networking. Springer. pp: 1-8.
XL. Zhou, Q., et al. Design and Implementation of Learning Analytics System for Teachers and Learners Based on the Specified LMS. in Educational Innovation through Technology (EITT), 2014 International Conference of. 2014. IEEE

View Download

MODELING AND PERFORMANCE EVALUATION OF PACKET SCHEDULING IN UPLINK 3GPP LTE SYSTEMS

Authors:

Samia Dardouri, Rund Fareed Mahafdah, Omaia Mohammad Al Omari, Ridha bouallegue

DOI NO:

https://doi.org/10.26782/jmcms.2020.03.00023

Abstract:

The radios must be distributed in the best way possible to provide higher quality of service (QoS) to users. A main component of Long-Term Evolution (LTE) processing is the packet scheduler, which includes all time and frequency support in active flows. We evaluate in this article three different scheduling algorithms in the uplink transmission path for the mixed forms of traffic flows for the Single Carrier Frequency Division Multiple Access (SC-FDMA). We apply metrics which allow fast evaluation of performance measures such as throughput, Packet Loss Ratio (PLR), Fairness Index (FI) and Spectral Efficiency (SE) by using the LTE-Sim open source simulator. The main contribution of this paper is to determine the appropriate uplink scheduling algorithm for VOIP and video traffics in 3GPP LTE

Keywords:

SC-FDMA,QoS,LTE,Scheduling algorithms,Resource allocation,Uplink direction,throughput,fairness,Packet loss ratio,Spectral Efficiency,

Refference:

I. 3GPP TS 36.213 V10.1.0, Technical Specification Group Radio Access Network (E-UTRA); Physical layer procedures, (2011-04).
II. 3GPP TS 36.213: Evolved Universal Terrestrial Radio Access (EUTRA); Physical layer procedures. Version 8.8.0 Release 8, 2009.
III. Abrignani, M., Giupponi, L., Lodi, A. et al. Scheduling M2M traffic over LTE uplink of a dense small cell network. J Wireless Com Network 2018, 193 (2018)..
IV. B. Nsiri, M. Nasreddine, M. Ammar,W. Hakimi, M. Sofien, Modeling and Performance Evaluation of Scheduling Algorithms For Downlink LTE cellular Network ICWMC 2014 : The Tenth International Conference on Wireless and Mobile Communications.
V. B. P. S. Sahoo, Deepak Puthal, Satyabrata Swain and Sambit Mishra, A Comparative Analysis of Packet SchedulingSchemes for Multimedia Services in LTE Networks in 2015 International Conference on Computational Intelligence Networks (CINE 2015).
VI. G. Piro, L. Alfredo Grieco, G. Boggia, F. Capozzi, Simulating LTE Cellular Systems: an Open Source Framework, Octobre 2010.
VII. H. Jang and Y. Lee, QoS-Constrained Resource Allocation Scheduling for LTE Network in International Symposium on Wireless and Pervasive Computing (ISWPC), 2013.
VIII. H. Safa , K. Tohme , Low Complexity Scheduling Algorithms for the LTE Uplink in the ISCC 2009 proceedings.
IX. http://trace.eas.asu.edu/, H.264/AVC and SVC video trace library.
X. J. Lim, H.G. Myung, and D.J. Goodman, Single Carrier FDMA for Uplink Wireless Transmission, in IEEE Vehicular Technology Magazine, Volume 1, Issue 3, pp 3039, 2007. 4. 3GPP, Tech. Specif. Group Radio Access Network – Physical Channel and Modulation (Release 8), 3GPP TS 36.211.
XI. K. Elgazzar, M. Salah, M. Abd-Elhamid Taha, H. Hassanein, Comparing Uplink Schedulers for LTE in IWCMC ’10 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference 2010.
XII. Long Term Evolution (LTE): A Technical Overview. Motorola. Retrieved July 3, 2010.
XIII. M. Iturralde, S. Martin and T. Ali Yahiya, Resource Allocation by Pondering Parameters for Uplink System in IEEE 38th Conference on LTE Networks in Local Computer Networks (LCN), 2013.
XIV. M. Salah , Najah Abu Ali , Abd-ElhamidTaha , HosamHassanein, Evaluating Uplink Schedulers in LTE in Mixed Traffic Environments in the IEEE ICC 2011 proceedings.
XV. Mamman M, Hanapi ZM, Abdullah A, Muhammed A (2019) Quality of Service Class Identifier (QCI) radio resource allocation algorithm for LTE downlink. PLoS ONE 14(1): e0210310. https://doi.org/10.1371/journal.pone.0210310
XVI. Mandeep Singh, HarpreetKaur, 0, Performance Enhancement of Heterogeneous LTE Networks Using EXP/PF Packet Scheduling Algorithm, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 07, Issue 08 (August – 2018),
XVII. Patra, A. , Pauli, V. , Yu Lang, Packet Scheduling for Real-Time Communication over LTE Systems in Wireless Days (WD)proceedings, 2013.
XVIII. R. Jain et al. A quantitative measure of fairness and discrimination for resource allocation in shared computer systems. Dig. Eq. Corp., Lit, MA, DEC Rep-DECTR-301 , Sep. 1984.
XIX. S. Hussain, Dynamic Radio Resource Management in 3GPP LTE, Blekinge Institute of Technology, January, 2009.
XX. S. Kwon, Neung-Hyung Lee, Uplink QoS Scheduling for LTE System, in the Vehicular Technology Conference (VTC Spring), 2011 proceedings.
XXI. S. Mohamed, Comparative Performance Study of LTE Uplink Schedulers, Thesis (Master, Electrical Computer Engineering) Queen’s University, 2011.
XXII. S. Nawaz Khan Marwat, T. Weerawardane, Yasir Zaki1 , Carmelita Goerg1 , and Andreas Timm-Giel2, Performance Evaluation of Bandwidth and QoS Aware LTE Uplink Scheduler, in Wired/Wireless Internet Communication Lecture Notes in Computer Science Volume 7277, 2012, pp 298-306.
XXIII. Yıldız, Önem & Sokullu, Radosveta. (2019). Mobility and traffic-aware resource scheduling for downlink transmissions inLTE-A systems. TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES. 27. 2021-2035. 10.3906/elk-1808-56.

View Download

FEATURE EXTRACTION FOR MOBILE HANDSET IN COHERENCY WITH PRICING FACTORS

Authors:

Anurag Tiwari, Vivek Kumar Singh, Praveen Kumar Shukla, Manuj Darbari

DOI NO:

https://doi.org/10.26782/jmcms.2020.03.00024

Abstract:

This paper presents a showcase of analysis of Mobile price with respect to the features it is able to analyse for the buyer. The paper gives machine learning approach in identification of the right price and its subsequent features detail. ANN with Back propagation algorithm has been chosen by developing a customized mobile selection algorithm using Kaggle database for modelling and Analysis. Various cost factors are adjusted in relation with the features to be incorporated in the Handset. The adjustment of input variables is done by the help of the machine learning technique giving the exact relationship in three main factors Requirement of the customer based on their segmentation, Price and Features.

Keywords:

Mobile Selection Criteria,MachineLearning,ANN,DSS,

Refference:

I. A Chaudhary, S. Kolhe and Rajkamal, “Performance Evaluation of feature selection methods for Mobile devices”, ISSN: 2248-9622, Vol. 3, Issue 6, NovDec 2013, pp.587-594.

II. A Lapedes and R. Farber, “How Neural Networks Works”, in Neural Information Processing Systems(D.Z. Anderson,ed.),(Denver), American Institute of Physics,NewYork,pp. 442-456,1988.

III. Bourassa, S.C., Cantoni, E. and Hoesli, M. 2007. “Spatial dependence, housing submarkets, and house price prediction”, The Journal of Real Estate Finance and Economics, 35(2), p.143-160.

IV. GONGGI, S., 2011. New model for residual value prediction of used cars based on BP neural network and non-linear curve fit. In: Proceedings of the 3 rd IEEE International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)

V. H. Liu and R. Setiono, “A probabilistic approach to feature selection – A filter solution,” the 13th International Conference on Machine Learning, pp. 319-327, 1996.

VI. H.White, “Learning in Artificial Neural Networks :A Statistical Perspective ”,Neural Computation,1(4),pp.425-464,1989.

VII. Kanwal Noor and Sadaqat Jan, “Vehicle Price Prediction System using Machine Learning Techniques” , International Journal of Computer Applications (0975 – 8887) Volume 167 – No.9, June 2017.

VIII. Khaidem, Luckyson&Saha, Snehanshu&Basak, Suryoday&Kar, Saibal&Dey, Sudeepa. (2016). Predicting the direction of stock market prices using random forest.

IX. Lei Dong, Carlo Ratti, Siqi Zheng,”Predicting neighborhoods’ socioeconomic attributes using restaurant data Proceedings of the National Academy of Sciences Jul 2019, 116 (31) 15447-15452;

X. Limsombunchai, V. 2004. “House Price Prediction: Hedonic Price Model vs. Artificial Neural Network”, New Zealand Agricultural and Resource Economics Society Conference, New Zealand, pp. 25-26. 2004

XI. M. Hall, “Feature Selection for Discrete and Numeric Class Machine Learning”, Department of Computer Science.

XII. M. Robnik and I. Kononenko, “Theoretical and Empirical Analysis of ReliefF and RReliefF”, Machine Learning Journal, 2003.

XIII. M.C. Mozer,”A Focused Back – propagation Algorithm for Temporal Pattern Recognition”,Complex Systems,3,pp.349-381,1989.

XIV. Mariana Listiani , 2009. “Support Vector Regression Analysis for Price Prediction in a Car Leasing Application”. Master Thesis. Hamburg University of Technology.

XV. Minitab Express Support. Interpret all statistics and graphs for Multiple Regression.[Online] Available

XVI. Mobile data and specifications online available from https://www.flipkart.com/ (Last Accessed on Friday, ‎ December ‎22, ‎2019, ‏ ‎ 3:14:34 PM)

XVII. NamhyoungK,Kyu J, Yong.K, A New Ensemble Model for Efficient Churn Prediction in Mobile Telecommunication, 2012 45th Hawaii international conf on system sciences.

XVIII. Nau, R. 2014. Notes on linear regression analysis, Lecture handouts, Duke University, Furqa School of Business, 26 nov 2014.

XIX. Nisha Thomas and Mercy.”Implementation of Back propagation Algorithm in Reconfigurable Hardware”.2011.

XX. R.Linsker, “From Basic Network Principles to Neural Architecture”, in Processings of the National Academy of Sciences,83,(USA),pp 7508-7512,8390-8394,8779-8783,1986.

XXI. S.E .Fahlman, “Fast Learning Variations on Backpropagation : An EmpricialStudy”,in Proc . 1998 connectionist Model Summer School (D.S. Touretzky, G.E. Hinton, and T.J. Sejnowski ,eds.), San Mateo ,CA:MorganKaufmann,pp. 38-51,1989.

XXII. S.Titri, H. Bourmeridja.”New Reuse Design Methodology for Artificial Neural Network Implementation”.1999.

XXIII. SameerchandPudaruth . “Predicting the Price of Used Cars using Machine Learning Techniques”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 753764

XXIV. Shonda Kuiper, “Introduction to Multiple Regression: How Much Is Your Car Worth? ” , Journal of Statistics Education • November 2008

XXV. Singh, Y., Bhatia, P. K., &Sangwan, O. 2007. “A review of studies on machine learning techniques”, International Journal of Computer Science and Security, 1(1), 70-84.

XXVI. SireeshaJasti ,TummalaSitaMahalakshmi”Multiple Linear Regression”,IJRTE,pp. 1919-1925,August 2019.

XXVII. Suebsing and N. Hiransakolwong, “Euclideanbased Feature Selection for Network Intrusion Detection”, International Conference on Machine Learning and Computing IPCST, 2011.

XXVIII. Sundsøy, Pål&Bjelland, Johannes &reme, bjørn-atle&jahani, eaman. (2016). Deep Learning Applied to Mobile Phone Data for Individual Income Classification. 10.2991/icaita-16.2016.24.

XXIX. TadayoshiHorita, Takuroa Murata and ItsuoTakanami.”A Multiple Weight and Neuron Fault Tolerant Digital Multilayer Neural Network”.2006.

XXX. Thu ZarPhyu, NyeinNyeinOo. Performance Comparison of Feature Selection Methods. MATEC Web of Conferences42, (2016).

XXXI. X.Yao ,”A New Evolutionary System for Evolving Artificial Neural Networks”,IEEETrans.Neural Networks,8,May 1997.

XXXII. Z. Karimi and M. Mansour and A. Harounabadi “Feature Ranking in Intrusion Detection Dataset using combination of filtering”, International Journal of Computer Applications,Vol.78,September 2013.

View Download

BLENDING MULTI-OBJECTIVE OPTIMIZATIONAND QUALITY FUNCTION DEPLOYMENT FOR DETERMINING COST AND QUALITY

Authors:

Anurag Tiwari, Vivek Kumar Singh, Praveen Kumar Shukla, Manuj Darbari

DOI NO:

https://doi.org/10.26782/jmcms.2020.03.00025

Abstract:

The Blending problem is one of the oldest and best known optimization problems. It is generally formulated as a linear program and has been applied in many fields. However, the mixing problem encountered in the industry requires much more than direct linear programming formulation. Indeed, the classic blending model would almost always be impossible due to the problem of blending in the industry. Indeed, it is often not possible to combine the characteristics of the mixtures as desired, which leads decision makers to seek solutions as close as possible to specific solutions. In this article, we develop and solve a versatile optimization model for the problem of blending, in which we minimize the total cost of the raw materials to be used, as well as violations of the desired characteristic scores of the final blends. We also present a parametric model which is used as a reference point to compare the multi-objective optimization model.

Keywords:

MOO,QFD,Mobile Handsets,

Refference:

I. D Yagyasen, M Darbari, PK Shukla, VK Singh (2013), “Diversity and convergence issues in evolutionary multiobjective optimization: application to agriculture science”, IERI Procedia.

II. D Yagyasen, M Darbari (2014),”Application of semantic web and petri calculus in changing business scenario”Modern Trends and Techniques in Computer Science.

III. R Asthana, NJ Ahuja, M Darbari (2011),”Model proving of urban traffic controls using neuro Petri nets and fuzzy logic”International Review on Computers and Software (IRECOS.

IV. S Bansal, M Darbari(2012),”Application of Multi Objective Optimization in Prioritizing and Machine Scheduling: a Mobile Scheduler Toolkit”International Journal of Applied Information Systems 3 (2), 24-28.

V. SS Ahmad, M Darbari, H Purohit (2015),”Handling web dynamics of internet marketing supply chain using evolutionary algorithms and semantic breakdown strategy”International Business Information Management ConferenceNetherlands.

VI. SS Ahmad, H Purohit, F Alshaikhly, M Darbari (2013),”Information granules for medical infonomics”International Journal of Information and Operations Management Education.

VII. SaviturPrakash and ManujDarbari, “‘Quality & Popularity’ Prediction Modeling of TV Programme through Fuzzy QFD Approach,” Journal of Advances in Information Technology, Vol. 3, No. 2, pp. 77-90, May, 2012.doi:10.4304/jait.3.2.77-90

VIII. Sofia Angeletou, Matthew Rowe, and HarithAlani: Modelling and Analysis of User Behaviour in Online Communities, 10th International Semantic Web Conference Bonn, Germany, October 23-27, 2011, Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg.

IX. Yang. S.Y, Hyun Ko, Seung, Wok. H, Hee. Y. Y, (2007), “Priority-Based Message Scheduling for the Multi-agent System in Ubiquitous Environment”, IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology – Workshops, pp. 395-398.

X. Yujian. Fu, Kan. W, Junwei. Y (2006), “A Multi-Agent System for Manufacturing Material Resource Planning”, Sixth International Conference on Intelligent Systems Design and Applications (ISDA’06) Volume 2, pp. 1118-1123.

XI. Zhanjie. W, Yanbo. L (2006), “A Multi-Agent Agile Scheduling System for Job-Shop Problem”, Sixth International Conference on Intelligent Systems Design and Applications (ISDA’06) Volume 2, pp. 679-683.

View Download