Methods of Gathering Data for Research Purpose and Applications Using IJSER Acceptance Rate of Monthly Paper Publication (March 2012 Edition-May 2013 Edition)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
A good number of scientist or researchers find it very difficult in carrying out their research work successfully due to lack of good knowledge of data collection method and application. Data is referred to as a collection of facts, such as values or measurements, observation or even just descriptions of things. Various ways are used for data collection in research work or designs depending on the research being done by the researcher. This study focuses on the Acceptance rate of monthly IJSER paper publication (March 2012 Edition-May 2013 Edition). Simple descriptive analysis was used. The result shows that Quantitative analysis is considered to be objective, without any human bias attached to it, because it depends on the comparison of numbers according to mathematical computations. While Analysis of qualitative data is generally accomplished by methods more subjective, dependent on people’s opinions, knowledge, assumptions, and inferences (and therefore biases), than that of quantitative data.
Authors and Affiliations
Osang, J. E.
A Survey of Network Security in Mobile Ad-Hoc Network
Abstract: This paper describes the concept of ad hoc networking and the security issues faced by giving its background and presenting some of the security challenges that are faced by the mobile ad hoc network. Ad hoc wi...
An Insight to Data Stream Mining and other Emerging Learning Algorithms
Abstract: Significant advancements have been made in the field of data mining and knowledge discovery. But there is no universal algorithm that can be dynamic enough to extract information from a continuous data st...
An Architecture to Achieve Anonymity and Traceability
Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the...
A Comparitative Survey on Malicious Nodes and Their Attacks in MANET
Abstract: The designation of the mobile ad hoc networks (MANET) is, particularly to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or n...
Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services
Abstract: The cloud offers data processing, data centers to process and preserve the transactional data of the clients. Dynamic capacity provisioning is promising approach for reducing energy consumption by dynamicallych...