Background/Objectives: Dengue fever is a mosquito-borne tropical disease caused by the dengue virus. It is a life-threatening disease lots of people died due to dengue because its symptoms are not detected at early stages many parsons thought that it was a normal fever or headache so that they ignore it which cause there are in dangerous situations and worst case they lose their life.
Methods/Statistical analysis: We applied data mining techniques along with artificial intelligence technique to create an expert system which can diagnose dengue with the help of symptoms provided by the users. In data mining portion, we use data filtering, data cleaning and clustering, and some other technique to enhance our dataset. Moreover, in AI portion we create an expert system where we create a knowledge base, fact base and GUI portion through user enter their symptoms and our system work is to predict dengue based on symptoms that user feed in GUI as input.
Findings: With the implementation of this project, we expect that our expert system is capable of predicting dengue based on person symptom's that we take as a Dataset and saves lots of life of various persons. The main aim of this project is accuracy measure and efficiency also because there is lots of work is pending in this area, and some researchers are searching for new methods.
Improvements/Applications: our proposed work will apply in the field of the medical area where a person is capable of checking their dengue symptoms and analyzing their disease.
Dengue, Malaria, Data Mining, Machine Learning, Artificial Intelligence, Expert System
DINESH CHANDRA,SHAZIYA ISLAM,DEEPAK PANDEY."Prediction of dengue with the use of AI and Data mining: An Expert system". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 09,pp.340-346, September - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I703.pdf,
 Md Younis Md Alzarrous and Mr. surya prakash mishra, "A novel data mining techniuque to discover pattern from huge text corpous," international jounral of Modern Engineering Research, vol. 4, no. 5, p. 6, may 2014.
 kashish, Anis, Shadma, Alam, Mansaf Ara Shakil, "Dengue Disease prediction Using Weka Data Mining tool," Elsevier, p. 26, Feb 2015.
 Dr. Dinesh singh, "An Empirical study of Techniques and Various Domains in Data Mining for Efficient approach in Various Fields," International Jounral of New Inventions in Engineering and Technology , vol. 8, no. 1, p. 7, April 2018.
 S. Chadsuthi2, K. Jampachaisri3, K. Kesorn* P. Siriyasatien1, "Dengue Epidemics Prediction: A Survey of the state of the art based on data science process," ieee, vol. 20, p. 36, october 2018.
 Nopember Surabaya, Mohammad Isa Irawan n Abdul Mahatir Najar, "Extreme Learning Machine Method for Dengue Hemorrhagic Fever Outbreak Risk Level Predictio," ieee, vol. 4, p. 5, sep 2018.
 Marco A. Ferreira Bircky and Ricardo Matsumura Araujoz Virginia Ortiz Andersson, "Towards Predicting Dengue Fever Rates Using Convolutional Neural Networks and Street-Level Images ," ieee, p. 8, June 2018.
 Ria Arafiyah1 and Fariani Hermin1, "Data mining for dengue hemorrhagic fever (DHF) prediction with naive Bayes method," Jounral of Physics, p. 5, July 2018.
 Mrs. A.Sumathi  P. Sathya , "Predicting Dengue Fever Using Data Mining Techniques," IJCST, vol. 6, no. 2, p. 3, March-April3 2018.
 F. Ibrahim proposed H. Abdul Rahiml, "A NOVEL PREDICTION SYSTEM IN DENGUE FEVER USING NARMAX MODEL ," Ieee, p. 5, october 2017.
 Dr.A.Anitha proposed Ms.S.Freeda Jebamalar, "A Survey on Prediction of Dengue Fever Using Data Mining Techniques," IJSEM, vol. 2, no. 12, p. 3, Dec 2017.
 Dr. P. Isakki Devi P. Manivannan, "Dengue Fever Prediction Using K-Means Clustering Algorithm," Ieee, p. 5, Sep. 2017.
1*: Ph.D (Research Scholar),CSE, IKGPTU, Jalandhar, Punjab, India <br> 2: Professor and Principal, SUS Institute of Computer Science, Mohali, Punjab, India
Background/Objectives: In WSN, numerous obstacles are there in providing Quality of Service (QoS) routing at some preferred level. The main concern of the routing protocols in WSN is to offer energy-efficient framework. To propose an energy-efficient routing protocol, stability and overall lifetime has a major role. Therefore, this research article has an objective to propose an energy-efficient clustering method in WSN using cuckoo search for routing protocol.
Methods/Statistical analysis: This research has proposed a route discovery process with the cluster heads (CH). The CH distortion of CH has been identified later on and for the optimization of battery life, Cuckoo Search (CH) optimization algorithm has been used.
Findings: It has been discovered that with the utilization of proposed CS mechanism, the CH method become speedy and the selected CH helps in the prevention of packet loss as of maximal energy.
Improvements/Applications: With the usage of CS method, an enhancement has been noticed in proposed work by means of remaining battery power, throughput and Packet Delivery ratio (PDR). To be precise, 3.9% of improvement has been drawn than the conventional methods.
WSN, Clustering, routing mechanism, Energy efficiency, Cuckoos Search
Navdeep Kumar Chopra,Rajesh Kumar Singh."Energy aware clustering approach for routing mechanism in WSN using Cuckoo Search". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 07,pp.340-345, July - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I702.pdf,
 H. Kim and S. Han, "An Efficient Sensor Deployment Scheme for Large-Scale Wireless Sensor Networks," in IEEE Communications Letters, vol. 19, no. 1, pp. 98-101, Jan. 2015.
 S. Gowrishankar, T. G. Basavaraju, D. H. Manjaiah, Subir Kumar Sarkar, "Issues in wireless sensor networks", Proceedings of the World Congress on Engineering, vol. 1, pp. 978-988, 2008
 Agrawal Palak, P. R. Pardhi, "Routing Protocols For WSN", International Journal Of Computer Science And Applications, vol. 8, no. 1, 2015.
 Y. Choi, I. Syed, H. Kim, "Event information based optimal sensor deployment for large-scale wireless sensor networks", IEICE Trans. Commun., vol. E95-B, no. 9, pp. 2944-2947, Sep. 2012
 V. Karthikeyan, A. Vinod, P. Jeyakumar, "An Energy Efficient Neighbour Node Discovery Method for Wireless Sensor Networks", arXiv preprint arXiv:1402.3655, 2014
 S. K. Singh, M. P. Singh, D. K. Singh, "A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks", Int. J. Adv. Netw. Appl., vol. 2, no. 2, pp. 570-580, Sep. 2010.
 Farooq Muhamnmad, Omer Abdul, Basit Dogar, Ghalib Asadullah Shah, "MR-LEACH: multi-hop routing with low energy adaptive clustering hierarchy", Sensor Technologies and Applications (SENSORCOMM) 2010 Fourth International Conference, pp. 262-268, 2010.
 A. Karthikeyan, V. Jagadeep and A. Rakesh, "Energy-efficient multihop selection with PEGASIS routing protocol for wireless sensor networks," 2014 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, 2014, pp. 1-5
 J. Kulshrestha and M. K. Mishra, "DPEGASIS: Distributed PEGASIS for chain construction by the nodes in the network or in a zone without having global network topology information," 2017 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, 2017, pp. 13-17.
 R. Dutta and S. Gupta, "Energy-aware modified PEGASIS through packet transmission in wireless sensor network," 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, 2016, pp. 443-446
 D. Baghyalakshmi, Ebenezer Jemimah, S. A. V. Satyamurty, "Low latency and energy-efficient routing protocols for wireless sensor networks", Wireless Communication and Sensor Computing 2010. ICWCSC 2010. International Conference on, pp. 1-6, 2010.
 A Razaque, KM. Elleithy, "Energy-efficient border node medium access control protocol for wireless sensor networks", Sensors, vol. 14, no. 3, pp. 5074-117, Mar. 2014.
 A. Razaque, M. Abdulgader, C. Joshi, F. Amsaad and M. Chauhan, "P-LEACH: Energy-efficient routing protocol for Wireless Sensor Networks," 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, 2016, pp. 1-5.
 R. Meelu, R. Anand, "Performance evaluation of cluster-based routing protocols used in heterogeneous wireless sensor networks", International Journal of In-formation Technology and Decision Making, vol. 4, no. 1, pp. 227-231, 2011.
1 PG Scholar, Dept of Computer Science and Engineering, DKTE Society's Textile & Engineering Institute, Ichalkaranji (An Autonomous Institute), India. 2 Associate Professor, Dept of Computer Science and Engineering, DKTE Society's Textile & Engineering Institute, Ichalkaranji (An Autonomous Institute), India.
Image segmentation is referred to as one of the most important processes of image processing. Image segmentation is the technique of dividing or partitioning an image into parts, called segments. It is mostly useful for applications like image compression or object recognition because for these types of applications, it is inefficient to process the whole image. So, image segmentation is used to segment the parts from the image for further processing. Semantic image segmentation is a vast area for computer vision and machine learning researchers. Many vision applications need accurate and efficient image segmentation and segment classification mechanisms for assessing the visual contents and perform real-time decision making. In this paper, we recommend conditional random ﬁeld (CRF) based framework for weakly supervised semantic segmentation. First merging super pixels into large pieces and use these pieces for further use to identify objects. The pieces from all the training images are gathered and associated with appropriate semantic labels by CRF. In the case of testing, by using the potential energy of each piece merged from super pixels are compare with piece library. For results, we use commonly used the dataset for image segmentation is MSRC-21 and VOC 2012 with state-of-art.
Conditional random ﬁeld (CRF), Generate super pixels, Merge super pixels, Constructing piece library, Semantic label.
P.S.Gunde,Dr. S.K.Shirgave."Object Identification Using Weakly Supervised Semantic Segmentation". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN: 2349-7084, Vol.6, Issue 07,pp.334-339, July - 2019, URL: https://ijcert.org/ems/ijcert_papers/V6I701.pdf,
 L. Ladicky, C. Russell, P. Kohli, and P. H. S. Torr, “Graph cut based inference with co-occurrence statistics,” in Proc. Eur. Conf. Comput.Vis., Heraklion, Greece, 2010, pp. 239–253.
 H. Lu, G. Fang, X. Shao, and X. Li, “Segmenting human from photo images based on a coarse-to-fine scheme,” IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 42, no. 3, pp. 889–899, Jun. 2012.
 J. Carreira and C. Sminchisescu, “CPMC: Automatic object segmentation using constrained parametric min-cuts,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 7, pp. 1312–1328, Jul. 2012.
 Y.-L. Hou and G. K. H. Pang, “Multicue-based crowd segmentation using appearance and motion,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 43, no. 2, pp. 356–369, Mar. 2013.
 X. Yuan, J. Guo, X. Hao, and H. Chen, “Traffic sign detection via graphbased ranking and segmentation algorithms,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 45, no. 12, pp. 1509–1521, Dec. 2015.
 Y.-T. Chen, X. Liu, and M.-H. Yang, “Multi-instance object segmentation with occlusion handling,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Boston, MA, USA, 2015, pp. 3470–3478.
 J. Wang and A. L. Yuille, “Semantic part segmentation using compositional model combining shape and appearance,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Boston, MA, USA, 2015, pp. 1788–1797.
 H. Zhang, J. E. Fritts, and S. A. Goldman, “Image segmentation evaluation: A survey of unsupervised methods,” Comput. Vis. Image Understand., vol. 110, no. 2, pp. 260–280, 2008.
 G. Csurka and F. Perronnin, “A simple high performance approach to semantic segmentation,” in Proc. Brit. Mach. Vis. Conf., Leeds, U.K., 2008, pp. 1–10.
 F. Wang, Q. Huang, M. Ovsjanikov, and L. J. Guibas, “Unsupervised multi-class joint image segmentation,” in Proc. IEEE Conf. Comput. Vis.Pattern Recognit., Columbus, OH, USA, 2014, pp. 3142–3149.
 A. Vezhnevets, V. Ferrari, and J. M. Buhmann, “Weakly supervised semantic segmentation with a multi-image model,” in Proc. IEEE Int.Conf. Comput. Vis., Barcelona, Spain, 2011, pp. 643–650.
 Y. Liu, J. Liu, Z. Li, J. Tang, and H. Lu, “Weakly-supervised dual clustering for image semantic segmentation,” in Proc. IEEE Conf. Comput.Vis. Pattern Recognit., Portland, OR, USA, 2013, pp. 2075–2082.
 L. Zhang et al., “Probabilistic graphlet cut: Exploiting spatial structure cue for weakly supervised image segmentation,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Portland, OR, USA, 2013, pp. 1908–1915.
 K. Zhang, W. Zhang, Y. Zheng, and X. Xue, “Sparse reconstruction for weakly supervised semantic segmentation,” in Proc. Int. Joint Conf.Artif. Intell., Beijing, China, 2013, pp. 1889–1895.
 L. Zhang et al., “A probabilistic associative model for segmenting weakly supervised images,” IEEE Trans. Image Process., vol. 23, no. 9,pp. 4150–4159, Sep. 2014.
 P. O. Pinheiro and R. Collobert, “From image-level to pixel-level labeling with convolutional networks,” in Proc. IEEE Conf. Comput. Vis.Pattern Recognit., Boston, MA, USA, 2015, pp. 1713–1721.
 J. Dai, K. He, and J. Sun, “Boxsup: Exploiting bounding boxes to supervise convolutional networks for semantic segmentation,” in Proc. IEEE Int. Conf. Comput. Vis., Santiago, Chile, 2015,pp. 1635–1643
 Radhakrishna Achanta, Appu Shaji, Kevin Smith, Aurelien Lucchi, Pascal Fua, and Sabine Susstrunk, SLIC Superpixels, EPFL Technical Report 149300, June 2010.
 Yi Li, Yanqing Guo, Member, IEEE, Yueying Kao, and Ran He “Image Piece Learning for Weakly Supervised Semantic Segmentation” IEEE transaction on systems, man, and cybernetics: systems, vol. 47, april 2017.
Computer Science and Engineering, SDM College of Engineering and Technology, Visveswaraya Technological University, Dharwad, India
Phishing is an attempt to get any sensitive information like user identity information, banking details and passwords from target or targets which is considered as fraudulent attack. Phishing causes huge loss to the internet users every year. It is a captivating technique used obtain all the personal and financial information from the pool users of internet. This project deals with the methodologies of identifying the phishing websites with the help of machine leaning algorithms. We have considered the lexical properties, host based and page-based properties of the URLs which are used for identifying the phishing URLs. Various Machine learning algorithms are implemented for feature evaluation of the URLs which have widespread phishing properties. These website properties are refined so that a best suitable classifier tis identified which can distinguish between benign and phishing site.
Sushma Joshi,Dr S.M Joshi."Phishing Urls Detection Using Machine Learning Techniques". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 06, June - 2019, URL :326-333,
 Joby James, Sandhya L, Ciza Thomas: Detection of Phishing URLs Using Machine Learning Techniques. In Proc. Of 2013 International Conference on Control Communication and Computing (ICCC).
 J. Ma, L. K. Saul, S. Savage and G. M. Voelker,” Beyond Blacklists: Learning to Detect Phishing Web Sites from Suspicious URLs”, Proc.of SIGKDD '09
 J. Ma, L. K. Saul, S. Savage, and G. M. Voelker,” Learning to Detect Phishing URLs”, ACM Transactions on intelligent Systems and Technology, Vol. 2, No.3, Article 30, Publication date: April 2011.
 Garera S., Provos N., Chew M., Rubin A. D., “A Framework for Detection and measurement of phishing attacks”, In Proceedings of the ACM Workshop on Rapid Malloced (WORM), Alexandria, VA.
 D. K. McGrath, M. Gupta, “Behind Phishing: An Examination of Phisher Modi Operandi”, In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET).
 C. Whittaker, B. Ryner, and M. Nazif. Large-scale automatic classification of phishing pages. In Proc. Of the 17th Annual Network and Distributed System Security Symposium (NDSS’10), California, USA, February 2010.
 Phistank. https://www.phishtank.com
 Curlie. https://curlie.org
 I. Rogers “Google Page Rank – Whitepaper”
 Shraddha Parekh, Dhwanil Parikh, Srusti Kotak, Prof Smita Sankhe, A New Method for Detection of Phishing Websites: URL Detection “. In Proc Of 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)
 Ram B. Basnet and Andrew H. Sung, “Learning to Detect Phishing Webpages”, In proceedings of Journal of Internet Services and Information Security.
 Mohammad Fazli Baharuddin, Tengku Adil Tengku Izhar, Mohd Shamsul Mohd Shoid “Malicious Url Classification System Using Multi-Layer Perceptron Technique”, In proceedings of the Journal of Theoretical and Applied Information Technology.
College of Teacher Education, President Ramon Magsaysay State University (Formerly Ramon Magsaysay Technological University) Iba, Zambales, Philippines
This study explored and determined the participation level in physical activities of Grade VI pupils of Palauig Central Elementary School, Palauig, Zambales, Philippines enrolled during the school year 2017. This study proposed an interventions and/or strategies to increased participation in physical activities which were categorized as role model, instant activity, distribution of equipment and transition.
This present study employed a descriptive research method and used a survey questionnaire as main instrument for data gathering. Descriptive such as percentage, frequency counts and weighted mean were employed for the statistical analysis.
Findings of the study revealed that the pupil-respondents level of participation in physical activities was rated as Minimal Participation in rolling, dribbling, striking, kicking, bouncing, hopping, leaping, tag games, ball games, skipping, fitness circuit, simple mixer dance and galloping. The pupils strongly agreed to the strategies presented in the present study such as role model, instant activity, distribution of equipment and transition to increase participation level of pupils in physical activities at school. It was highly suggested that the school may provide a concrete plan of activities and/or guideline aimed to increase physical activity opportunities for the pupils as well as all members of the educational community. School administrator and educators should intensify the awareness campaigns for pupils, parents and other educators on the importance of physical activity participation and benefits of being physically fit.
Physical Activity, Sports, Level of Participation, Pupils, Strategies, Increased Participation
Angelo R. Ganaden ."Strategies to Enhance Physical Activity Participation Level among Pupils ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 06,pp.317-325, June - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I601.pdf,
 The UNESCO, “International Charter of Physical Education, Physical Activity and Sport of 1978.”
 Physical Activity Guidelines for Americans, Department of Health and Human Services, http://www.health.gov/paguidelines/default.aspx. (2008).
 Physical Activity Guidelines for Americans, Office of Disease Prevention & Health Promotion, US Department of Health and Human Services (11 January 2010).
 J. Withall, R. Jago, & K.R. Fox, 2011, “Why some do but most don't. Barriers and enablers to engaging low-income groups in physical activity programmes: a mixed methods study,” BMC Public Health. 2011
 C3 Collaborating for Health, “The benefits of physical activity for health and well‐being,” 2011.
 C.K. Fox, D. Barr-Anderson, D. Sztainer and M. Wall, “Physical activity and sports team participation: Associations with academic outcomes in middle school and high school students.” Journal of School Health. 2010; 80(1):31–37. 2010.
 C.R. Fredericks, S.J. Kokot and S. Krog, “Using a developmental movement programme to enhance academic skills in grade 1 learners.” South African Journal for Research in Sport, Physical Education and Recreation. 2006; 28 (1): 29–42. 2006.
 J.M. Monti, C.H. Hillman and N.J. Cohen, “Aerobic fitness enhances relational memory in preadolescent children: The FITKids randomized control trial.” Hippocampus. 2012; 22(9):1876–1882. 2012.
 A. Charlton and M. Potter, “Barriers to Participation. Department for Culture, Media and Sports,” 2010. Retrieved from www.gov.uk/governtment/uploads/TP_Barri ersrrepot.pdf
 C.N. Rasberry, S.M.S. Lee, L. Robin, B.A. Laris, L.A. Russell, K.K. Coyle, & A.J. Nihiser, “The association between school-based physical activity, including physical education, and academic performance: A systematic review of the literature,” Preventive Medicine, Elsevier, 2011.
 A.L., Fedewa and S. Ahn, “The effects of physical activity and physical fitness on children's achievement and cognitive outcomes: A meta-analysis,” Research Quarterly for Exercise and Sport, 82(3):521–535, 2011.
 C. Cruz, D. Villena, E. Navarro, R. Belecina, and M. Garvida, “Towards Enhancing the Managerial Performance of School Heads,” www.irmbrjournal.com June 2016. International Review of Management and Business Research Vol. 5 Issue.2, 2016.
 S.M. Lee, C.R. Burgeson, J.E. Fulton, & C.G. Spain, “Physical Education and Physical Activity: Results from the School Health Policies and Programs Study 2006,” Published 2007.
 National Association for Sport and Physical Education, “Physical education in the Context of Schooling,” 2012 http://www.ncbi.nlm.nih.gov/books/NBK201493/
 American Heart Association, “Recommendations for Physical Activity in Adults and Kids. 2006. https://www.heart.org/en/healthy-living/fitness/fitness-basics/aha-recs-for-physical-activity-in-adults
 UNICEF, “World report on child injury prevention” World Health Organization, 2008.
 SHAPE America, “National PE Standards. National Standards & Grade-Level Outcomes for K-12 Physical Education,” 1900 Association Drive, Reston, VA 20191 http://www.shapeamerica.org/standards/pe/ 2014.
 A.R. Ganaden, G. Barrientos and D.M. Anaud, “Constraints in Sports Participation among Pupils of Cabangan Central Elementary School, Cabangan District, Zambales, Philippines,” TEXTROAD Journals -Journal of Social Sciences and Humanity Studies (JSSHs). Vol. 3, No. 6 November 2017 ISSN 2356-8852, November, 2017.
 J. W. Kang, “Perceived Constraints on Sport Participation among Young Koreans in Australia,” International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering Vol: 7, No: 5, 2013. Retrieved fromhttp://waset.org/publications/9997661/perceived-constraints-on-sportparticipation-among-young-koreans-in-australia, 2013.
 S. Dolan, “Nautilus Fitness Center” • Godfrey, IL, United States, https://web.facebook.com/NautilusAlton/posts/1049681801720488?_rdc=1&_rdrJanuary 28, 2016
 J.E. Donnelly and K. Lambourne, “Classroom-based physical activity, cognition, and academic achievement,” Preventive Medicine. 2011;52. J.B. Bartholomew and E.M. Jowers, “Physically active academic lessons in elementary children. Preventive Medicine.” 2011; 52. 2011.
 D.L. Kibbe J. Hackett, M. Hurley, A. McFarland, K.G. Schubert, A. Schultz and S. Harris, “Ten years of TAKE 10!®: Integrating physical activity with academic concepts in elementary school classrooms,” Preventive Medicine. 2011; 52.
 J. M. Durban and R. D. Catalan, “Issues and Concerns of Philippine Education through the Years,” Asian Journal of Social Sciences & Humanities. Vol. 1. No. 2. May 2012. http://www.ajssh.leenaluna.co.jp/AJSSHPDFs/Vol.1(2)/AJSSH2012(1.2-08).pdf\
 Coaching Association of Canada, “Coaching Association of Canada partners with Active for Life in promoting physical literacy,” Active for Life.
 C.H. Hillman, D.M. Castelli and S.M. Buck, “Aerobic fitness and neurocognitive function in healthy preadolescent children,” Medicine and Science in Sports and Exercise, 37(11):1967. 2005.
Information Technology Department, D.K.T.E.’s Textile and Engineering Institute Ichalkaranji India
: World Wide Web is the biggest source of information. Though the World Wide Web contains a tremendous amount of data, most of the data is irrelevant and inaccurate from users’ point of view. Consequently, it has become increasingly necessary for users to utilize automated tools such as recommender systems in order to discover, extract, filter, and evaluate the desired information and resources. recommender systems (RS) are widely used in e-commerce, social networks and several other domains. Web page recommender systems predict the information needs of users and provide them with recommendations to facilitate their navigation. Web content and Web usage mining techniques are employed as conventional methods for recommendation. Machine Learning techniques used for recommender system are Clustering, Association rules and Markov models. These techniques have strengths and weaknesses. Combining different systems to overcome disadvantages and limitations of a single system may improve the performance of recommenders. Hybrid recommender systems can be used to avoid the drawbacks or limitations of previous recommendation method. They combine two or more methods to improve recommender performance. In this paper, the four recommender systems are combined by using different hybridization methods. The effects of the hybrid recommenders are examined by comparing the results of hybrid system against the results of single recommendation method. Result shows that the hybrid recommender provides successful recommendation when the recommended page is generated by all the systems of the hybrid.
Shrenik R Patil."HYBRIDIZATION OF WEB PAGE RECOMMENDER SYSTEMS BASED ON ML TECHNIQUES ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 05,pp.310-316, May - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I501.pdf,
 Agrawal R., & Srikant R., "Fast algorithms for mining association rules," in J. B. Bocca, M. Jarke, & C. Zaniolo (Eds.), Proceedings of the 20th international conference on extensive databases, VLDB, 1994, pp. 487–499.
 Agrawal R., Swami A, Imieliński T., "Mining association rules between sets of items in large databases", Proceedings of the 1993 ACM SIGMOD international conference on Management of data - SIGMOD '93, 1993, p. 207.
 Barragáns-Martínez A. B., Costa-Montenegro E., Burguillo J. C., Rey-López, M., Mikic-Fonte, F. A., & Peleteiro, A. “A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition.” Information Sciences, 180(22), 2010 p. 4290–4311.
 Burke R. “Hybrid recommender systems: Survey and experiments”. User Modeling and User-Adapted Interaction, 12(4), 2007, 331–370.
 Deshpande M., & Karypis G., “Selective Markov models for predicting Web page accesses,” ACM Transactions on Internet Technology (TOIT), 4(2), 2004, 163–184.
 Ericson, K., & Pallickara, S. (2011, December). On the performance of distributed clustering algorithms in file and streaming processing systems. In Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on (pp. 33-40). IEEE.
 Ericson, K., & Pallickara, S. (2013). On the performance of high dimensional data clustering and classification algorithms. Future Generation Computer Systems, 29(4), 1024-1034.
 Gündüz S. & Özsu M. T., "A Web page prediction model based on Click-Stream Tree representation of user behavior", in Proceedings of 9th ACM international conference on knowledge discovery and data mining (KDD), Washington, DC, USA, August 2003.
 Magdalini Eirinaki and Michalis Vazirgiannis, “Web Mining for Web Personalization” Communications of the ACM, vol. 3, No. 1, Feb. 2003 pp.2-21.
 Mobasher B., Dai H., Luo T., & Nakagawa M., “Effective personalization based on association rule discovery from Web usage data” in Web information and data management, 2001, pp. 9–15.
 Tao Luo, Bamshad Mobasher, Honghua Dai, Miki Nakagawa, “Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization,”Data Mining and Knowledge Discovery6(1), 2002,p.61–82.
 Vlado Kesˇelj, Haibin Liu “Combined mining of Web server logs and web contents for classifying user navigation patterns and predicting users’ future requests”. Data & Knowledge Engineering 61, 2007, 304–330.
 Wang Q., Makarov D. J., and Edwards H. K., "Characterizing customer groups for an e-commerce website," EC'04, USA, 2004, p. 218-227.
 Lu, J., Shambour Q., Xu Y., Lin Q., & Zhang, G., “A Web-Based Personalized Business Partner Recommendation System Using Fuzzy Semantic Techniques. Computational Intelligence,” in Press, 2012.
 Lucas, J. P., Segrera, S., & Moreno, M. N. (2012). Making use of associative classifiers to alleviate typical drawbacks in recommender systems. Expert Systems with Applications, 39(1), 1273-1283.
 Uyar A. S., Demir G. N., Goksedef M., "Effects of session representation models on the performance of web recommender systems," In Proceedings of the workshop on data mining and business intelligence, 2007, pp. 931–936.
Mr. Shashank Karn, Mr. Sumit Chaurasia, Mr. Kedar Davate, Dr. Milind U. Nemade, Dr. Namrata F. Ansari
Student, Electronics Engineering, K.J.S.I.E.I.T, University of Mumbai, Mumbai, India
In the modern era of advertising, the role of marketing has increased exponentially. The marketing strategies of big brands nowadays highly rely on digital media. A new method of marketing known as digital marketing has evolved more than rest of the marketing strategies. Digital marketing has now become the need of the hour for various brands and e-commerce platform. The proposed system will help such brands to reach out the end user more efficiently and frequently. The proposed system is based on implementation of Robotic Process Automation (RPA) which is a method used for deployment of software-based robots that mimic the functionalities of human operating a machine.
Mr. Shashank Karn,Mr. Sumit Chaurasia,Mr. Kedar Davate,Dr. Milind U. Nemade,Dr. Namrata F. Ansari."RPA Based Digital Marketing Robot". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 04,pp.304-309, April - 2019, URL :http://ijcert.org/ems/ijcert_papers/V6I402.pdf,
 Cyrille Bataller, Mougins (FR); Adrien Jacquot, Antibes Juan-les- Pins (FR); Sergio Raul Torres, Den Haag (NL), “Robotic Process Automa-tion,” Accenture Global Solutions Limited, Dublin (IE), 8th April 2016.A. Criminisi, P. Perez, and K. Toyama, “Region filling and object removal by exemplar-based image inpainting.”, IEEE Transactions on Image Processing, vol. 13, no.9, pp. 1200–1212, 2004.
 Professor Mary Lacity, Curators Professor, University of Missouri-St. Louis Visiting Professor, The London School of Economics and Political Science; Professor Leslie Willcocks The Outsourcing Unit Department of Management the London School of Economics and Political Science; Andrew Craig The Outsourcing Unit Senior Visiting Research Fellow the London School of Economics and Political Science, “Robotic Process Automation at Telefnica O2,”April 2015.
 Mauro Bampo, Michael T. Ewing, Dineli R. Mather, David Stewart, Mark Wallace, “The Effects of the Social Structure of Digital Networks on Viral Marketing Performance,” 5 Jun 2008.
 Petra Peura, "Robotic Process Automation Concept for Service Management," Metropolia University of Applied Sciences Bachelor of En-gineering Industrial Management Thesis. 6 May 2018.
 Sorin Anagnoste, “Robotic Automation Process - The next major rev-olution in terms of back office operations improvement,”The Bucharest University of Economic Studies, Bucharest, Romania sorin. [email protected]
 Mickey Williams,Microsoft Visual C# (Core Reference) Microsoft Press Redmond, WA, USA 2002.
 Blase Ur , Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken , Noah Picard, Diane Schulze, Michael L. Littman Brown University, Carnegie Mellon University, University of Zurich ,”Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes”
 STEVEN OVADIA LaGuardia Community College, Long Island City, New York,”Automate the Internet With If This Then That (IFTTT)”, Behavioral & Social Sciences Librarian, 33:208211, 2014
Dept. Computer Science Engineering, Buddha Institute of Technology,Gorakhpur (U.P.), India
Bitcoin is a popular cryptocurrency that records all transactions in an allotted append-handiest public ledger referred to as a blockchain. The security of Bitcoin heavily relies on the motivation-suitable proof-of-work (PoW) founded dispensed consensus protocol, which is run with the aid of the community nodes known as miners. Because of its inception, blockchain technological know-how has proven promising application possibilities. The spectrum of blockchain functions stages from financial, healthcare, automobile, hazard administration, internet of matters (IoT) to public and social offerings. Several reports focal point on utilizing the blockchain information structure in various applications. These vulnerabilities result in the execution of different security threats to the ordinary functionality of Bitcoin. We then examine the feasibility and robustness of the brand new safety solutions. Moreover, we discuss the current anonymity concerns in Bitcoin and the privateness-related threats to Bitcoin customers together with the evaluation of the comprehensive privacy-keeping solutions.
Blockchain, Bitcoin, Peer to Peer digital currency
Ayushi Singh,Gulafsha Shujaat,Isha Singh,Abhishek Tripathi,Divya Thakur."A Survey of Blockchain Technology Security ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 04,pp.299-303, April - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I401.pdf,
 A. Ferrag, . M. Derdour and . M. Mukherjee, “Blockchain technologies for the internet of things: research,” IEEE, 2018.
 . B. Carminati, . L. Bahri and . E. Ferrari, “Decentralized privacy preserving services for online social networks,” Online Soc Netw media, 2018.
 Z. Zheng , . S. Xie and H.-N. Dai, “Blockchain challenges and opportunities: a survey,” Int. J. Web and Grid Services, vol. 14, 2018.
 Unocoin, “What Factors Are Influencing Blockchain Technology,” 2018.
 X. Li, P. Jiang, Q. Wen and X. Luo, “A survey on the security of blockchain systems,” Future Generation Computer Systems, 2017.
 Z. Zheng, S. Xie and H. Wang, “Blockchain challenges and opportunities: A Survey,” Internat. J. Web Grid Serv., 2016.
 M. Ghosh, M. Richardson and B. Ford, “A TORPATH TO TORCOIN, PROOF-OF-BANDWIDTH ALTCOINS FOR COMPENSATING RELAYS”.
 Intel, “Proof of elapsed time (poet),” 2017.
 P. Technologies, “Proof of Authority Chains,” 2017.
 A. Gervais, G. Karame and V. Glykantzis, “On the security and performance of proof of work blockchains,,” SIGSAC Conference on Computer and Communications Security, 2016.
 W. J. Gordo and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,” Computational and Structural Biotechnology Journal, 2018.
 M. Hölbl, A. Kamišali´ and L. N. Zlatolas, “A Systematic Review of the Use of Blockchain,” Symmetry 2018, 2018.
 P. Novotny, D. N. Dillenberger and R. Vaculin, “Permissioned Blockchain Technologies for”.
 K. Yilmaz, “Comparison of Permissioned Blockchains,” Coinmonks.
 H. Mayer, “ECDSA Security in Bitcoin and Ethereum: a Research,” 2016.
 S. Alliance, “Know your ransomware: Ctb-locker,” 2017.
 N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous,” The 22nd International Conference on World wide, 2017.
 A. Miller, M. Möser, K. Lee and A. Narayanan, “An empirical analysis of linkability in the monero blockchain,” ArXiv preprint, 2017.
 E. community, “Official Go implementation of the Ethereum protocol,” 2017.
 B. Bodó, J. P. Quintais and D. Gervais, “Blockchain and smart contracts: the missing link in copyright licensing,” International Journal of Law and Information Technology, vol. 26, no. 4, 2018.
 Z. Zheng, S. Xie and H.-N. Dai, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” IEEE International Congress on Big Data, 2017.
 M. Bartoletti, T. Cimoli and L. Pompianu, “Blockchain for social good: a quantitative analysis,” Goodtechs, 2018.
 A. Kosba, C. Papamanthou and . A. Miller, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” IEEE Symposium on Security and Privacy, 2016.
ECE, Chennai Institute of Technology, Anna University, Chennai, India
A quad-band circularly polarised (CP) patch antenna for 7.1/7.6/7.9/8.6 GHz for UWB/5G applications are proposed in this paper. By designing the patch antenna with an inverted U-shaped radiator, I-shaped and L-shaped strips which are all rotated by 45ᵒ at the horizontal axis. The measurement of -37.51 dB of return loss for 8.6 GHz frequency was obtained.
A microstrip line feed technique was used for feeding which is one of the contacting schemes used in the feeding methods. A conducting strip is connected directly to the edge of the microstrip patch. It provides a simple planar structure since the conducting strip is smaller in size when compared to the patch. The substrate FR_4 epoxy has high electrical insulation, good mechanical strength, better wear, and corrosion resistance. The measured 3 dB AR information is 5.63% (6.9-7.3 GHz), 5.26% (7.4-7.8 GHz), 5.0% (7.8-8.2 GHz) and 3.50% (8.4-8.7 GHz) severally. This antenna can be used in UWB/5G applications which offer high-speed data transmission.
A.Sivabalan,G.Bharathi,K.Deepeka Rani,."QUAD-BAND CIRCULARLY POLARIZED PATCH ANTENNA FOR UWB/5G APPLICATIONS". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 03, March - 2019, pp:293-298.
S. Gao, Q. Luo, and F. Zhu, “Circularly
Polarized antennas,” Wiley-IEEE Press, New York, November 2013.
T. T. Le and H. C. Park, “Very simple circularly polarized printed patch antenna with enhanced bandwidth,” Electron. Lett. vol. 50, no. 25, pp. 1896–1898, 2014.
T. V. Hoang and H. C. Park, “Very simple 2.45/3.5/5.8 GHz triple-band circularly polarized printed mono pole antenna with bandwidth enhancement,” Electron. Lett, vol. 50, no. 24, pp. 1792–1793, 2014.
S. Verma and P. Kumar, “Compact triple-band antenna for WiMAX and WLAN applications,” Electron. Lett., vol. 50, no. 7, pp. 484–486, 2014.
 J. G. Baek and K. C. Hwang, “Triple-band unidirectional circularly polarized hexagonal slot antenna with multiple L-shaped slits,” IEEE Trans. Antennas Propag., vol. 61, no. 9, pp. 4831–4835, 2013.
 K. Agarwal, Nasimuddin, and A. Alphones, “RIS-Based compact circularly polarized mircostrip antennas,”IEEE Trans. Antennas Propag., vol. 61, no. 2, pp. 547–554, 2013.
1 Assistant Professor, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia 2 Dean, VelTech University, TamilNadu, India 3 College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia
At present the machinery and their effortlessness are incredibly essential things that compose our lives full of expediency. They can also be enhanced for employ in sensitive sites that cause a threat to human being. In general a group of people who are involved in agricultural. There are various difficulties they face throughout their works. Naturally the agriculture land is very complex to reach some of the places we are in. This study makes it easy to use a Wireless Ultrasonic Auto Navigation Robot (Wireless UAN Robot) to diminish the risk of injuries that might occur while walking or by car. The modern robot consists of a custom-made structure with a circular shape that is competent to navigate easily in most hazardous places and rotate in rigid spaces.
Agriculture robot, Ultrasonic sensor, Arduino IDE, Bluetooth RC controller, LCD,
Dr.J.VijiPriya,Dr.S.Suppiah,Ms. Rana Mohammad."Wireless Ultrasonic Auto Navigation Robot for Agriculture ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 03,pp.288-292, March - 2019, URL :http://ijcert.org/ems/ijcert_papers/V6I301.pdf,
 Leo Louis, “Working Principle Of Arduino And Using It As A Tool For Study And Research”, International Journal of Control, Automation, Communication and Systems (IJCACS), Vol.1, Issue.2, 2016.
 Shubham Dhage , Pradip Patil , Data Kande , Dr. Prakash Pati,“Wireless Controlled Multipurpose Agricultural Robot”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,2016
 Patrick Piper and Jacob Vogelpublished a paper on “Designing an Autonomous Soil Monitoring Robot”, IEEE, 2015.
 Fale and Bhure amit published a paper on “Autonomous farming robot with plant health indication”,IJATES, 2015.
 Bakker T, van Asselt K, Bontsema J, Müller J, van Straten G,“Autonomous navigation using a robot platform in a sugar beet field”. Biosyst Eng, 2011
 Blasco J, Aleixos N, Roger JM, Rabatel G, Moltó E, “Robotics weed control using machine vision”. Biosyst Eng, 2002.
 Emmi L, Gonzalez-de-Soto M, Pajares G, Gonzalez-de-Santos P, 2014. “New trends in robotics for agriculture: integration and assessment of a real fleet of robots” Sci World J, 2014.
 Galadima, A.A., "Arduino as a learning tool," in Electronics, Computer and Computation (ICECCO), 2014.
1*Research Scholar, PTU, Jalandhar 2 Professor, SUS Institute of Computer, Tangori, Punjab
Background/Objectives: Cloud computing is a shared pool of configurable computer system resources and higher-level services. These services quickly configured over the Internet to achieve consistency and economies of scale.
Methods/Statistical analysis: In this research, the DVFS (Dynamic Voltage and Frequency Scaling) mechanism is used to save energy in the cloud environment. In the existing work, MBFD has been used to check the resources in the physical machine. In case, if the resources are available, then the VM is placed over the PM. However, the problem is that the MBFD algorithm does not check the PM and hence result in higher energy consumption.
Findings: In this paper, the MBFD algorithm is enhanced by using the concept of DVFS along with the concept of location-aware algorithm. Due to this algorithm, VM which is near to the server is executed first by measuring the distance. To measure the performance the parameters such as energy consumption and TCJ are measured.
Improvements/Applications: The proposed framework reduced energy consumption and increased the total completed jobs.
Cloud computing, DVFS, Virtualization, MBFD, Energy Consumption
Varun Jasuja,Dr. Rajesh Kumar Singh."Enhanced MBFD Algorithm to Minimize Energy Consumption in Cloud". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 02,pp.266-271, February - 2019, URL :https://ijcert.org/ems/ijcert_papers/V6I202.pdf,
 P. Mell and T. Grance, “The NIST Definition of Cloud Computing”, National Institute of Standards and Technology: U.S. Department of Commerce, NIST Special publication 800-145, September, 2011.
 Brown, Kevin, and Suresh Singh. "A network architecture for mobile computing." INFOCOM'96. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE. Vol. 3. IEEE, 2002.
 Chen, Xu, et al. "Efficient multi-user computation offloading for mobile-edge cloud computing." IEEE/ACM Transactions on Networking, Vol. 5, pp. 2795-2808, 2016.
 Dinh, Hoang T., et al. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing Vol. 13, Issue.18 pp.1587-1611, 2013.
 Gai, Keke, et al. "Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing." Journal of Network and Computer Applications Vol. 59, pp. 46-54, 2016.
 Jo, Minho, et al. "Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing." IEEE Wireless Communications Vol. 22, Issue. 3, pp. 50-58, 2015.
 Rahimi, M. Reza, et al. "Mobile cloud computing: A survey, state of the art and future directions." Mobile Networks and Applications Vol. 19, Issue.2, pp.133-143, 2014.
 Tong, Liang, Yong Li, and Wei Gao. "A hierarchical edge cloud architecture for mobile computing." INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE. IEEE, 2016.
 Yi, Shane, Cheng Li, and Qun Li. "A survey of fog computing: concepts, applications, and issues." Proceedings of the 2015 workshop on mobile big data. ACM, 2015.
 A. Beloglazov, and R. Buyya, “Energy Efficient Allocation of Virtual Machines in Cloud Data Centers”, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577-578, 2010.
 Wei, B. (2012), “A novel energy optimized and workload adaptive modeling for live migration”, International Journal of Machine Learning and Computing, Vol. 2, Issue. 2, pp. 158-162, 2012.
 Safari, Z., Bohlol, N., &Fouladfar, E. (2015, April). Optimized live migration using NRU and modified clock policy. In e-Commerce in Developing Countries: With a focus on e-Business (ECDC), 2015 9th International Conference on (pp. 1-8). IEEE.
 A. Beloglazov, J. Abawajy, and R. Buyya, “Energy-aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing,” Future Generation Computer Systems, Elsevier, Vol. 28, Issue 5, pp. 755-68, 2012.
 Chung, B. D., Jeon, H., &Seo, K. K., “A framework of cloud service quality evaluation system-focusing on security quality evaluation," International Journal of Software Engineering Application, Vol. 8, Issue 4, pp. 41-46, 2014.
 D. Jayasinghe, C. Pu, T. Eilam, M. Steinder, I. Whalley, and E. Snible, “Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-aware Virtual Machine Placement”, IEEE International Conference on Services Computing, pp.72-79, 2011.
 Ye, K., Jiang, X., Huang, D., Chen, J., & Wang, B. Live migration of multiple virtual machines with resource reservation in cloud computing environments. In Cloud Computing (CLOUD), 2011 IEEE International Conference on IEEE, pp. 267-274, 2011.
 S. Esfandiarpoor, A. Pahlavan, and M. Goudarzi, “Virtual Machine Consolidation for Data center Energy Improvement”, Cornell University Library, Ithaca, New York, 2013.
 Taha, A., Metzler, P., Trapero, R., Luna, J., & Suri, N. ,”Identifying and utilizing dependencies across cloud security services”, In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ACM, pp. 329-340.
 L. Wu, SK Garg, and R. Buyya, “SLA-Based Resource Allocation for Software as a Service Provider (SaaS) In Cloud Computing Environments,” 11th IEEE/ACM International Symposium on Cluster, Cloud And Grid Computing, pp. 195-204, 2011.
 Diallo, M. H., August, M., Hallman, R., Kline, M., Slayback, S. M., & Graves, C.,” AutoMigrate: a framework for developing intelligent, self-managing cloud services with maximum availability, Cluster Computing, Vol. 20, Issue. 3, pp. 1995-2012, 2017.
 Q. Zhang, Q. Zhu, and R. Boutaba, “Dynamic Resource Allocation For Spot Markets In Cloud Computing Environments,” 4th IEEE International Conference on Utility and Cloud Computing, pp. 178-185, 2011.
 Kumar, M.,” Review of practical issues of resource & risk management in cloud computing”, International Journal of Advanced Research in Engineering and Applied Sciences, Vol. 3, Issue. 5, pp. 23-34, 2014.
 S. Zaman, and D. Grosu, “A Combinatorial Auction-Based Mechanism for Dynamic VM Provisioning and Allocation in Clouds,” IEEE Transactions on Cloud Computing, vol. 1, issue 2, pp.129-141, 2013.
 A. Quiroz, H. Kim, M. Parashar, N. Gnanasambandam, and N. Sharma, “Towards Autonomic Workload Provisioning for Enterprise Grids and Clouds”, 10th IEEE/ACM International Conference on Grid Computing, Canada, pp. 50-57, 2009.
 Roy, N., Dubey, A., &Gokhale, A. ,”Efficient autoscaling in the cloud using predictive models for workload forecasting”, In Cloud Computing (CLOUD), 2011 IEEE International Conference on IEEE, pp. 500-507, 2011.
 Joao N. Silva, L. Veiga, and P. Ferreira, “Heuristic for Resources Allocation on Utility Computing Infrastructures”,ACM Proceedings of the 6th International Workshop on Middleware for Grid Computing, 2008.
 Z. Xiao, W. Song, and Qi Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment”, IEEE Transactions on Parallel and Distributed system, Vol. 24, Issue 6, pp. 1107-1117, 2013.
 Qiu, M., &Sha, E. H. M. ,” Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems”, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 14, Issue. 2, pp. 25-32, 2009.
 Qiang Li, Q. Hao, L. Xiao, and Z. Li, “Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control,” IEEE First International Conference on Information Science and Engineering, pp. 99-102, 2009.
 Ahmed, M. T., & Hussain, A., Survey on energy-efficient cloud computing systems.
 Esfandiarpoor, S., Pahlavan, A., &Goudarzi, M. ,”Virtual Machine Consolidation for Datacenter Energy Improvement”, 2013.
 Bertini, L., Leite, J. C., &Mossé, D. ,”Power optimization for dynamic configuration in heterogeneous web server clusters”, Journal of Systems and Software, Vol. 83, Issue. 4, pp. 585-598, 2010.
President Ramon Magsaysay State University (PRMSU), Iba, Zambales, Philippines
Appraisal of the adequacy of Social Studies Curriculum Standards in ten themes was the main purpose of the research study. This endeavour was intended to provide input to quality Social Studies instruction in the Kto12 Basic Education Program and an enhance students’ civic competence. The study utilized the quantitative descriptive research design with questionnaire as the main instrument in gathering data from one hundred teachers in Department of Education Zone 1 Division of Zambale, Philippines during the school year 2017-2018.
Findings established a high adequacy of Social Studies Curriculum Standards on Themes: Culture; Time, Continuity and Change; People, Places and Environments; Power, Authority and Governance; Production, Distribution and Consumption; Science, Technology and Society; Global Connections; and Civic Ideals and Practices. The themes which should include experiences for the study of Individual Development and Identity; and interactions among Individuals, Groups and Institutions were assessed adequately. The Analysis of Variance result revealed a no significant difference on the perception towards dimensions on adequacy of Social Studies Curriculum Standards in the Junior Secondary Schools. It was recommended that the teachers with the support of the School Heads should attend conferences focused on themes - Individual Development and Identity and Individual, Groups and Institution in order to gain more insights how these themes be meaningfully presented to students, thereby contributes to the attainment of the intended goals.
Social Studies, Social Studies Curriculum Standards, Junior Secondary Schools, Appraisal, Adequacy
Marie Fe D. De Guzman, Roosevelt Ecle."The Social Studies Curriculum Standards in Junior Secondary Schools; Input to Quality Instruction and Students’ Civic Competence". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN: 2349-7084, Vol.6, Issue 02,pp.255-265, February - 2019,
 F. C. Chukwuemeka, “Evaluation of the Implementation of the Social Studies Curriculum in Junior Secondary Schools in EnuguState." Department of Arts Education University of Nigeria, May 2014.
 U. Azikiwe, “Curriculum Theory and Practice,” Curriculum Organization of Nigeria, 2009.
 A. I. Ebiringa, “Assessment of Instructional Competencies of Teachers of Accounting for Implementation of Senior Secondary School Curriculum,” Unpublished M.Ed. Thesis, University of Nigeria, Nsukka., 2012.
 National Council for the Social Studies (NCSS), Social Studies Curriculum Standards, 1994.
 O. J. Olukayode, “Analysis of Social Studies Evaluation in Selected Secondary Schools in Ogun State,” Nigeria. Global Journal of Human Social Sciences. Volume 12 Issue 8 Version 1.0 May 2012,
 D. O. Adesina, “Assessment of the Social Studies Curriculum of Secondary School in South-western Nigeria,” Educational Research (ISSN: 2141-5161) Vol. 4(4) pp. 345-351, April 2013.
 K. A. Chick and B. Hong, “Differentiated Instruction in Elementary Social Studies: Where Do Teachers Begin? Penn State Altoona,” Social Studies Research and Practice. Volume 7 Number 2, 2012.
 DepEd Discussion Paper, “Discussion Paper on the Enhanced K+12 Basic Education Program,” 05 October 2010.
 Kto12 Gabay Pangkurikulum Araling Panlipunan Baitang 1–10, 2013.
 Teach for America (2011) Instructional Planning and Delivery.
 National Council for the Social Studies (NCSS), Expectations of Excellence: “Curriculum Standards for Social Studies,” Washington D.C., 2010.
 E.W., Ross, S. Mathison, and K. D. Vinson, “Social studies education and standards-based education reform in North America: curriculum standardization, high-stakes testing, and resistance,” Revista Latinoamericana de Estudios Educativos. No. 1, Vol. 10, pp. 19-48. Universidad de Caldas, 2013.
 A. Babatunde, “Effective Evaluation n Teaching and Learning Social Studies."
 Larababalakantoma, “Assessment of the Implementation of Social Studies Curriculum in Junior Secondary Schools in Kaduna State, Nigeria,” Ahmadu Bello University, Zaria Nigeria, 2015.
 A. Bandura, “Social Foundations of thought and action. A Social Cognitive Theory,” Englewood Cliffs, N.J; Prentice-Hall. A., 1986
 K. A. Mezieobi, V. R. Fubara, and S. A. Mezieobi, S.A. “Social Studies in Nigeria: Teaching Materials and Resources,” Owerri: Acadapeak Publishers, 2008.
 R. Rothman, (2008). Teacher Evaluation in Public Education. Washington DC: Education Sector, 2008.
 N. Dizon, N. B. Orge & M. F. D. de Guzman, “Continuing Professional Development through Utilization of Learning Action Cell (LAC) Sessions of Secondary Social Studies Teachers,” Journal of Educational Realities-JERA. University of Uyo, Nigeria, 2019.
 R. A. Catacutan & M. F. D. de Guzman, “The Project- Based Learning (PBL) Approach in Secondary Social Studies Instruction at Zone 2, Division of Zambales, Philippines,” International Journal of Scientific & Engineering Research Volume 8, Issue 11, November-2017
 B. Corpuz and G. Salandanan, “Principles of Teaching." Lorimar Publishing Inc. Quezon City, 2007.
 B. M. Dalyop, “Evaluation of Social Studies Curriculum on Students’ Appreciation of Cultural Diversity,” Journal of Modern Education Review, ISSN 2155-7993, USA, July 2014, Volume 4, No. 7, pp. 536–540, 2014.
 E. Neville, “A Case Study of Fifth Grade Social Studies Curriculum for Inclusion of Multicultural Education,” 2006.
 T. Dynneson and R. Gross, “Designing Effective Instruction for Secondary Social Studies,” Prentice Hall. USA, 1999.
 Samoa, “Teaching History a Guide for Teachers Teaching History for the First Time,” Council of Presidents of Pacific Island History Associations, 2003.
 M.F.D. de Guzman, J. Ababan and A. Gallardo, “Challenges in Teaching History Lessons in Public Secondary Schools, Zone 2, Division of Zambales, Philippines,” International Journal of Educational Research and Technology (IJERT). Volume 8  43-52. June 2017
 M. F. D. de Guzman, L. D. Olaguer, & E. G. Novera, “Difficulties Faced in Teaching Geography Lessons at Public Secondary Schools Division of Zambales, Philippines,” IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 22, Issue 9, Ver. 7, 2017.
 D. Lambert and J. Morgan, ”Geography and Development: Development Education in Schools and the Part Played by Geography Teachers, ”Geographical Association, UKAid. Development Education Research Centre, 2011.
 S. Benjamin, “Determining Methods used in Teaching Geography in Secondary Schools in Rongo District, Kenya,” 2014.
 Egbefo, D. (2010). Appraisal of Ethnic Nationalism and Violence in the Fourth Republic. Makurdi: Aboki Publishers.
 J. C. Onuoha, “Challenges of Social Studies Education,” Teachers in the implementation of Universal Basic Education Curriculum in Nigeria. Nigerian Journal of Curriculum Studies 18(1) 150 – 162, 2011.
 C. C. Okam “Reading in New Development in Nigerian Education: Issues and Highlights,” Jos: Deka Publication, 2008.
 S. A. Ezeudu and B. N. Ezegbe, “Nigerian Tertiary Social Studies Programme: Implications for Sustainable National Development,”Trust Publishers, 2005.
 A. F. Khaled, “Jordanian Students Attitudes toward Social Studies Education,” The Journal of International Social Research. Cilt: 6 Sayı: 24 Volume: 6 Issue: 24, 2013.
Department of Computer Engineering, TCET Mumbai, India
In E-commerce, the Reputation based trust models are extremely important for business growth. E-commerce website becomes more important in our day to days life because of varieties of information provided by it. 75 percent people are utilizing it for buying on the web items. The number of customer reviews on various products are increasing day-by-day. These vast numbers of reviews are beneficial to manufacturers and customers alike. It is a challenging task for a potential customer to read all reviews to make a better purchase decision.
This system is a web-based application where user will view and purchase various products online, user can provide review about the products and online shopping services. The System takes review of various users and based on the review, system will specify whether the products and services provided by the E-commerce enterprise is good, bad or worst. The proposed work includes a multidimensional trust model for computing reputation scores from user`s reviews. To implement this a Modified LDA algorithm for mining dimensions of ecommerce feedback comments is used. In this proposed work natural language processing and opinion mining techniques are used. This paper also includes the comparison based on accuracy, time complexity, a brief introduction information world and touch topic likes trust score, reputation trust and their ratings using Gibbs-sampling that creates various categories for feedback and assigns trust score.
E-commerce, SentiWordNet, NLP, Text mining, Modified LDA
Minakshi Ghorpade, Mrs Megharani Patil."Product Review Summarization for E-Commerce Site Using Gibbs Sampling Based LDA". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN: 2349-7084, Vol.6, Issue 01, January - 2019,
 Xiuhen Zhang, Lishan Cui, and Yan Wang, “Computing Multi-dimensional Trust by Mining E-Commerce Feedback Comments,” in IEEE Transactions on Knowledge and Data Engineering Vol:26 No:7 Year 2014
 P. Resnick and E. Friedman, “Reputation Systems: Facilitating Trust in Internet Interactions,” Communications of the ACM, vol. 43, pp. 45–48, 2000
 J. O’Donovan, B. Smyth, V. Evrim, and D. McLeod, “Extracting and visualizing trust relationships from online auction feedback comments,” in Proc. IJCAI’07, 2007, pp. 2826–2831.
 Y. Zhang and Y. Fang, “A fine-grained reputation system for reliable service selection in peer-to-peer networks,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1134–1145, Aug. 2007.
 P. Thomas and D. Hawking, “Evaluation by comparing result Set in context," in Proc. 15th ACM CIKM, Arlington, VA, USA, 2006, pp. 94101. Department
 H. Zhang, Y. Wang, and X. Zhang, “Efficient contextual transaction trust computation in e-commerce environments,” in Proc. 11th IEEE TrustCom, Liverpool, UK, 2012.
 G. Qiu, B. Liu, J. Bu, and C. Chen, “Opinion word expansion and target extraction through double propagation," Comput. Linguist, vol. 37, no. 1, pp. 927, 2011.
 Arun Monicka Raja M., Godfrey Winster S., Swamynathan S., “Review Analyzer: Analyzing Consumer Product Reviews from Review Collections,” IEEE International Conference on Recent Advances in Computing and Software Systems, 2012.
 S. Brody and N. Elhadad, “An unsupervised aspect-sentiment model for online reviews,” in Proc. HLT, Los Angeles, CA, USA, 2010, pp. 804–812.
 Geng Cui,Hun-KwongLui, XiaoningGuo,” Online Reviews as a Driver of New Product Sales,” IEEE International Conference on Management of e-Commerce and eGovernment, 2010.
 M. De Marneffe and C. Manning, “The Stanford typed dependencies representation,” in Proc. CrossParser, Stroudsburg, PA, USA, 2008.
 M. De Marneffe and C.Manning, ”The Standford typed dependencies representation,” in Proc. Cross Parser, Stroudsburg, PA, USA, 2008.
 Pang and L. Lee: Opinion mining and sentiment analysis. Found. Trends Inf. Retr., 2 (1-2):1–135, Jan. 2008.
 B. Liu, Sentiment Analysis and Opinion Mining. San Rafael, CA, USA: Morgan & Claypool Publishers, 2012.
 G. Casella and R. L. Berger. Statistical inference, Belmont, CA, USA, Duxbury Press, 1990.
Poonam Jaglan, Dr. Rajeshwar Dass, Dr. Manoj Duhan, ,
Research Scholar,Deenbandhu Chhottu Ram University of Science & Technology, Murthal.
Medical imaging generates the visual representation of the interior body parts for the clinical analysis/ medical intervention. Now a days, an advanced medical imaging technique i.e. MRI provides acute dissection anatomical information about the human soft tissues. MRI generally suffers from poor contrast, low quality due to improper brightness & blurriness. So contrast manipulation is compulsively needed. Image enhancement is taken as the initial step which defines the accuracy of result. The prime objective is to improve the visual appearance or to provide a better transform representation for future automated image processing like analysis, detection, segmentation & recognition. Among all the existing techniques of image enhancement, the appropriate choice must be influenced by the facts i.e. visual perspective, modality and climatic conditions. A trade-off between noise reduction and feature preservation of the original image depends upon the filter reconstruction ability and noise model. In this paper, four different filtering algorithms such as Median filter (MF), Gaussian filter (GF), Average filter (AF) and Wiener filter (WF) are used to compare the effects of most dominant noises in MR images by calculating the statistical parameters i.e. Mean Square Error, Peak Signal to Noise Ratio, Root Mean Square Error & Mean Absolute Error. Also the noise density was gradually added to MRI image for effective comparative analysis of the filters. Further, the proposed algorithm detected the tumor region appropriately.
Enhancement, Magnetic Resonance Imaging, Mean Square Error, Mean Absolute Error, Peak Signal to Noise Ratio, Root Mean Square Error, Segmentation.
Poonam Jaglan,Dr. Rajeshwar Dass,Dr. Manoj Duhan."Detection of Breast Cancer using MRI: A Pictorial Essay of the Image Processing Techniques". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.6, Issue 01,pp.238-245, January - 2019, URL :http://ijcert.org/ems/ijcert_papers/V6I0101.pdf,
 Rafael C. Gonzalez, Richard E. Woods “ Digital Image Processing” Third Edition
 M. K. S. Sivasundari, R. Siva Kumar, “Performance Analysis of Image Filtering Algorithms for MRI Images”, Int. J. Res. Eng. Technol., vol. 3, no. 5, pp. 438–440, 2014.
 http://cancerworld.net/wpcontent/uploads/2017/01/Growing-cancer-burden-in-Indai.jpg, June, 2018.
 J Edge et. al., “Magnetic resonance imaging of the breast: A clinical perspective”, South African Journal of Radiology, Vol. 16, No. 2, pp: 61-64, 2012.
 https://myleftbreast.net/wpcontent/uploads/2011/04/breast_mri.jpg, March, 2018.
 https://www.verywellhealth.com/what-does malignant-and-benign-mean-514240, Sept., 2018.
 https://www.gleneagles.com.sg/facilities-services/centre-excellence/cancer-care/breast-cancer, August, 2018.
 P. Janani*, J. Premaladha and K. S. Ravichandran , “Image Enhancement Techniques: A Study” Indian Journal of Science and Technology, vol 8(22), September 2015.
 Yogesh S. Bahendwar, G.R.Sinha “ Efficient Algorithm For Denoising Of Medical Images Using Discrete Wavelet Transforms” Mathematical Methods and Systems in Science and Engineering, ISBN: 978-1-61804-281-1
 Shailendra singh Negi, Yatendra Singh Bhandari “ A Hybrid approach to Image Enhancement using contrast stretching on image sharpening and the analysis of various cases arising using Histogram” ICRAIE-2014, 978-1-4799-4040-0/14/2014.