<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>ADCAIJ, Vol.10, n.3</title>
<link href="http://hdl.handle.net/10366/147222" rel="alternate"/>
<subtitle/>
<id>http://hdl.handle.net/10366/147222</id>
<updated>2026-05-02T04:26:42Z</updated>
<dc:date>2026-05-02T04:26:42Z</dc:date>
<entry>
<title>Brain Inspired Computing Approach for the Optimization of the Thin Film Thickness of Polystyrene on the Glass Substrates</title>
<link href="http://hdl.handle.net/10366/147247" rel="alternate"/>
<author>
<name>Mishra, Akshansh</name>
</author>
<author>
<name>Dixit, Devarrishi</name>
</author>
<id>http://hdl.handle.net/10366/147247</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">Advent in machine learning is leaving deep impact on various sectors including material science domain. The present paper highlights the application of various supervised machine learning regression algorithms such as polynomial regression, decision tree regression algorithm, random forest algorithm, support vector regression algorithm and artificial neural network algorithm to determine the thin film thickness of Polystyrene on the glass substrates. The results showed that polynomial regression machine learning algorithm outperforms all other machine learning models by yielding the coefficient of determination of 0.96 approximately and mean square error of 0.04 respectively.
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>An Empirical Analysis on Software Development Efforts Estimation in Machine Learning Perspective</title>
<link href="http://hdl.handle.net/10366/147248" rel="alternate"/>
<author>
<name>Rehman, Israr Ur</name>
</author>
<author>
<name>Ali, Zulfiqar</name>
</author>
<author>
<name>Jan, Zahoor</name>
</author>
<id>http://hdl.handle.net/10366/147248</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">The prediction of effort estimation is a vital factor in the success of any software development project. The available of expert systems for the software effort estimation supports in minimization of effort and cost for every software project at same time leads to timely completion and proper resource management of the project. This article supports software project managers and decision makers by providing the state-of-the-art empirical analysis of effort estimation methods based on machine learning approaches. In this paper ?ve machine learning techniques; polynomial linear regression, ridge regression, decision trees, support vector regression and Multilayer Perceptron (MLP) are investigated for the purpose software development effort estimation by using bench mark publicly available data sets. The empirical performance of machine learning methods for software effort estimation is investigated on seven standard data sets i.e. Albretch, Desharnais, COCOMO81, NASA, Kemerer, China and Kitchenham. Furthermore, the performance of software effort estimation approaches are evaluated statistically applying the performance metrics i.e. MMRE, PRED (25), R2-score, MMRE, Pred(25). The empirical results reveal that the decision tree-based techniques on Deshnaris, COCOMO, China and kitchenham data sets produce more adequate results in terms of all three-performance metrics. On the Albretch and nasa datasets, the ridge regression method outperformed then other techniques except pred(25) metric where decision trees performed better.
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>Projects Distribution Algorithms for Regional Development</title>
<link href="http://hdl.handle.net/10366/147245" rel="alternate"/>
<author>
<name>Jemmali, Mahdi</name>
</author>
<id>http://hdl.handle.net/10366/147245</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">This paper aims to find an efficient method to assign different projects to several regions seeking an equitable distribution of the expected revenue of projects. The solutions to this problem are discussed in this paper. This problem is NP-hard. For this work, the constraint is to suppose that all regions have the same socio-economic proprieties. Given a set of regions and a set of projects. Each project is expected to elaborate a fixed revenue. The goal of this paper is to minimize the summation of the total difference between the total revenues of each region and the minimum total revenue assigned to regions. An appropriate schedule of projects is the schedule that ensures an equitable distribution of the total revenues between regions. In this paper, we give a mathematical formulation of the objective function and propose several algorithms to solve the studied problem. An experimental result is presented to discuss the comparison between all implemented algorithms.
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>Deep Convolutional Neural Network Modeling and Laplace Transformation Algorithm for the Analysis of Surface Quality of Friction Stir Welded Joints</title>
<link href="http://hdl.handle.net/10366/147243" rel="alternate"/>
<author>
<name>Mishra, Akshansh</name>
</author>
<author>
<name>Patti, Anusri</name>
</author>
<id>http://hdl.handle.net/10366/147243</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">The quality of Friction Stir Welded joint depends on the input parameters like tool rotational speed, tool traverse speed (mm/min), tool tilt angle, and an axial plunge force. If there is any variation in these input parameters then there will be a chance of formation of various surface defects such as groovy edges, flash formation, and non-homogeneous mixing of alloys. The main objective of the present work is to use machine learning algorithms such as Deep Convolutional Neural Network (DCNN) and Laplace transformation algorithm to detect these surface defects present on the Friction Stir Welded joint.  The results showed that the used algorithms can easily detect such surface defects with good accuracy.
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>An Agent-Based Simulation to Explore Communication in a System to Control Urban Traffic with Smart Traffic Lights</title>
<link href="http://hdl.handle.net/10366/147244" rel="alternate"/>
<author>
<name>de Oliveira, Marcos</name>
</author>
<author>
<name>Teixeira, Robson</name>
</author>
<author>
<name>Sousa, Roberta</name>
</author>
<author>
<name>Tavares Gonçalves, Enyo José</name>
</author>
<id>http://hdl.handle.net/10366/147244</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">Populational growth increases the number of cars and makes the transport infrastructure increasingly saturated. The control of traffic lights by intelligent software is a promising way to solve the problem caused by this situation. This article addresses this problem that occurs in urban traffic. An agent-based simulation of an urban traffic control system is proposed. The solution is offered as intelligent traffic lights as agents to alleviate traffic congestion at a given location. Each agent controls a crossing and maintains communication with agents from other corners. Thus, they can have greater control of a larger area and identify patterns that can help them to solve congestion problems. The results of our simulated experiments point to the improvement of the urban traffic when using the proposed Multiagent System, in comparison with an approach that uses crossing agents without communication and other that implements static traffic lights.
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>Advance Approach for Detection of DNS Tunneling Attack from Network Packets Using Deep Learning Algorithms</title>
<link href="http://hdl.handle.net/10366/147246" rel="alternate"/>
<author>
<name>Sakarkar, Gopal</name>
</author>
<author>
<name>Kolekar, Mahesh Kumar H</name>
</author>
<author>
<name>Paithankar, Ketan</name>
</author>
<author>
<name>Patil, Gaurav</name>
</author>
<author>
<name>Dutta, Prateek</name>
</author>
<author>
<name>Chaturvedi, Ruchi</name>
</author>
<author>
<name>Kumar, Shivam</name>
</author>
<id>http://hdl.handle.net/10366/147246</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">Domain Name System (DNS) is a protocol for converting numeric IP addresses of websites into a human-readable form. With the development of technology, to transfer information, a method like DNS tunneling is used which includes data encryption into DNS queries. The ability of the DNS tunneling method of transferring data attracts attackers to establish bidirectional communication with machines infected with malwares. This can lead to sending instructions in an obfuscated way or can lead to data exfiltration. Since firewalls and intrusion detection systems detect only specific types of tunneling, were as the Machine Learning Algorithms can analyze and predict based on previous data provided to it, it is being adopted by researchers to detect and predict the occurrence of DNS Tunneling. The identification of anomalies in Network packets can be done by using Natural Language Processing (NLP) technique. The experimental test accuracy showed that the feature extraction method in NLP for detecting DNS tunneling in network packets was found to be 98.42% on the generated Dataset. This paper makes a comparative study of 1 Dimensional Convolution Neural Network (1-D CNN), Simple Recurrent Neural Network (Simple RNN), Long Short-Term Memory (LSTM) algorithm, Gated Recurrent Unit (GRU) algorithm for detecting DNS Tunneling over the generated dataset. To detect this threat of DNS tunneling attack, good quality of the dataset is required. This paper also proposes the generation of a good quality dataset that contains network packets, by the recreation of DNS Tunneling attack using tool dnscat2.
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>Crime Detection Using Sentiment Analysis</title>
<link href="http://hdl.handle.net/10366/147242" rel="alternate"/>
<author>
<name>Khan, Ruba</name>
</author>
<author>
<name>Siddiqui, Shadab</name>
</author>
<author>
<name>Rastogi, Abhishek</name>
</author>
<id>http://hdl.handle.net/10366/147242</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<summary type="text">Women and girls have been subjected to a great deal of violence and harassment in public locations around the country, ranging from stalking to abuse harassment and assault. This research paper examines the role of social media in improving women's safety in Indian cities, with a focus on the use of social media websites and apps such as Twitter, Facebook, and Instagram. This research also looks at how ordinary Indians can develop a sense of responsibility in Indian society so that we can focus on the protection of women in their surroundings. Tweets on the safety of women in Indian cities, which often include images and text as well as written phrases and quotations, can be used to send a message to the Indian youth culture and encourage them to take harsh action and punish those who harass women. Twitter and other Twitter handles that feature hash tag messages are extensively used throughout the world as a channel for women to share their feelings about how they feel when going to work or travelling by public transportation and what is their mental condition when they are surrounded by unknown males, and do they feel safe or not?
</summary>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>Índice</title>
<link href="http://hdl.handle.net/10366/147241" rel="alternate"/>
<author>
<name>Equipo Editorial, Adcaij</name>
</author>
<id>http://hdl.handle.net/10366/147241</id>
<updated>2025-06-05T12:36:20Z</updated>
<published>2021-10-05T00:00:00Z</published>
<dc:date>2021-10-05T00:00:00Z</dc:date>
</entry>
</feed>
