Salman Moiz | University of Hyderabad (original) (raw)

Papers by Salman Moiz

Research paper thumbnail of Visualization Recommendation for Incremental Data Based on Intent

Lecture Notes in Computer Science, 2023

Research paper thumbnail of Detection of Shotgun Surgery and Message Chain Code Smells using Machine Learning Techniques

IGI Global eBooks, May 13, 2022

Code smell is an inherent property of software that results in design problems which makes the so... more Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measure and area under ROC, yet the tree-based classifiers are performing better than other classifiers.

Research paper thumbnail of Software Component Retrieval Using Rough Sets

Advances in intelligent systems and computing, Jun 13, 2018

Software reusability is one of the important mechanisms needed to maintain its quality and produc... more Software reusability is one of the important mechanisms needed to maintain its quality and productivity. Even though the candidate components are available in the repository to be reused, software engineers prefer to develop the system from scratch. There exists fear of reuse because the developers are not sure whether candidate component will work. In this paper, first the focus is on retrieving the desired components based on rule generation using rough sets. If the component is not found, then it can be developed and stored in repository. Secondly, uncertainty in identifying the desired component is addressed and an approach to model such uncertainty is proposed. Rough set exploration system (RSES) tool is used to simulate the results on certain behaviors of banking domain.

Research paper thumbnail of Prioritize the Code Smells Based on Design Quality Impact

ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2019

Code smell is an indication of design problem or quality in the source code which constantly affe... more Code smell is an indication of design problem or quality in the source code which constantly affect the evolution of a software project. Refactoring is a technique which can remove the code smells to improve the design quality of the code. In the literature, there are many code smells, refactoring techniques, and refactoring tools. However, a software project often contains thousands of code smells and many of them have no relation to design quality. It is a challenge for developers to decide which kind of code smell should be refactored first. The state of the art techniques fall short in assisting developers in the prioritize of code smell shows the impact on design quality. In this paper, we have chosen 4 code smells and found the relationship among them with the help of dependency finder tool. With this finding, we are analyzing and prioritizing the code smells based on design quality. In this way, the code smell ordering (prioritize the code smells) is recommended to the developers which one to refactor first. The suggested order may dispel some of the code smell or may dispel some of possible refactoring techniques of the code smell in the large software project. We have evaluated, recommended order on simple java source code and the results show that the order which we suggested has more impacted on design quality.

Research paper thumbnail of Towards Truly Smart City Service Providers: A View on On-Demand Everything as a Services

Journal of critical reviews, 2020

Internet of Things (IoT) connects a large number of devices/objects, and these devices are being ... more Internet of Things (IoT) connects a large number of devices/objects, and these devices are being increased that it is foretold their number will reach billions in the near future, and hence increasing the number of IoT-based services. IoT is built on and integrated with many existing technologies (e.g., wireless sensors, mobile computing, and cloud) which support its spreading and scalability and help it to overcome its known challenges like limited resources. Moreover, service composition supports IoT in the rapid development of new IoT applications leveraging the existing services. These paradigms and techniques are fundamental building blocks and enablers of smart cities. IoT service composition and IoT integration with the above-stated technologies have been addressed in research and industry works. In this paper, we review several types compositions and give our view on future smart city service providers. We also propose a location-aware architecture for integrating IoT services and mobile application services. The proposal is illustrated based on shopping mall scenario, and the high-level architecture is presented in this work.

Research paper thumbnail of Personalized Dynamic Learning Plan Generator for Smart Learning Environments

International Journal of Recent Technology and Engineering (IJRTE), 2019

Transition of traditional online learning towards the Smart learning environments requires adapta... more Transition of traditional online learning towards the Smart learning environments requires adaptation of the smart features. Personalized assistance is one of the most required characteristic. Learning plans are important building blocks for any teaching learning paradigms. Often an instructor makes a learning plan keeping stakeholders into consideration. However in an online learning environment the stakeholders are not able to adapt to these static plans as there is no personalization involved. As a result there is a considerable increase in dropout rates. Hence there is a need for adaptive learning plans which aims for dynamic adjustment of schedules/learning plans that may help in successful completion of course. This paper presents an approach for dynamic learning plan generator and also proposes a revised Learning plan template to achieve personalized assistance in Smart learning environments. The responses of stakeholders on traditional learning plans and that of individualiz...

Research paper thumbnail of A holistic rubric for assessment of software requirements specification

2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH), 2017

Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scorin... more Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scoring guide that is used for assessing students learning outcomes. IEEE 830.1998 is a IEEE recommended practice for Software Requirements Specification. The design of rubrics for standard templates like that of IEEE SRS helps in assessing several projects with uniform scaling. In this work, a holistic rubric is created for IEEE 830.1998 standard SRS template assessment. This rubric is applied on the actual students submissions over Moodle platform. The results show that the traditional assessment by the faculty and the proposed rubric based assessment matches closely and provides scope for the course development through formative assessment.

Research paper thumbnail of A Framework Studio for Component Reusability

The deployment of a software product requires considerable amount of time and effort. In order to... more The deployment of a software product requires considerable amount of time and effort. In order to increase the productivity of the software products, reusability strategies were proposed in the literature. However effective reuse is still a challenging issue. This paper presents a framework studio for effective components reusability which provides the selection of components from framework studio and generation of source code based on stakeholders needs. The framework studio is implemented using swings which are integrated onto the Net Beans IDE which help in faster generation of the source code.

Research paper thumbnail of Method Level Code Smells: Chernoff Face Visualization

Software that is badly written and prone to design problems often smells. Code smells results in ... more Software that is badly written and prone to design problems often smells. Code smells results in design anomalies that make software hard to understand and maintain. Several tools and techniques available in literature helps in detection of code smells. But the severity of the smells in the code is often not known immediately as it lacks visualization. In this paper, two method level code smells namely long method and feature envy are visualized using chernoff faces. Techniques proposed in literature either use knowledge driven approach or data driven approach for code smell detection. In the proposed approach a fusion of both knowledge and data driven approach is used to identify the most relevant features. These most relevant features are mapped to the 15 desired features of chernoff faces to visualize the behavior of the code. The result shows that almost 95% of the smells are visualized correctly. This helps in analyzing the programmer’s capability in maintaining quality of sour...

Research paper thumbnail of Enhanced layered fog architecture for IoT sensing and actuation as a service

Scientific Reports, 2021

The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in ... more The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is ...

Research paper thumbnail of Blockchain Enabled Smart Learning Environment Framework

Learning and Analytics in Intelligent Systems, 2019

Smart learning provides a holistic learning to students with a major paradigm shift by using mode... more Smart learning provides a holistic learning to students with a major paradigm shift by using modern day technologies. The Learning Management systems are mostly built using traditional standard frameworks like that of IEEE Learning Technology Systems Architecture (LTSA). These frameworks are not suitable to smart learning environment as they lack several desired features to qualify for smartness levels in learning. In this paper a modified block chain enabled LTSA framework is proposed to realize the sense level of smartness. The proposed framework is evaluated for various security threats suitable in virtual learning. The risk impact factor for several threats is compared for several threat patterns and it is observed that risk impact factor sufficiently reduced in the proposed framework as compared to that of LTSA.

Research paper thumbnail of Model Based Software Development: Issues Challenges

International Journal of Computer Science and Informatics, 2013

One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.

Research paper thumbnail of Single Lock Manager Approach for Achieving Concurrency Control in Mobile Environments

Lecture Notes in Computer Science

In a mobile computing environment, users can perform on-line transaction processing independent o... more In a mobile computing environment, users can perform on-line transaction processing independent of their physical location. In a mobile environment, multiple mobile hosts may update the data simultaneously which may result in inconsistency of data. To solve such problems many concurrency control techniques have been proposed. The traditional two phase locking protocol has some inherent problems such as deadlocks &

Research paper thumbnail of Concurrency Control in Mobile Environments: Issues & Challenges

International Journal of Database Management Systems, 2011

The use of data services from handheld devices has increased exponentially resulting in several c... more The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.

Research paper thumbnail of Extraction of State Transition Diagrams from Legacy C++ Application

Procedia Technology, 2012

Research paper thumbnail of A Methodology To Manage Victim Components Using Cbo Measure

International Journal of Software Engineering & Applications, 2012

Research paper thumbnail of An Analytical Approach for Guaranteeing Concurrency in Mobile Environments

Research paper thumbnail of An Algorithmic approach for achieving Concurrency in Mobile Environment

ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving da... more ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving data consistency. Due to concurrent executions, transactions initiated by mobile hosts may make the data inconsistent when accessing the same resource. Uneven delay by a mobile host in committing a particular transaction may make other hosts accessing the same resource to wait for an invariant time. This may lead to starvation. This paper proposes an algorithmic approach for preserving consistency during concurrent executions. A simulator, based on this algorithm is build to verify the proposal using the row locking mechanism

Research paper thumbnail of Exploiting Shared Cache For Cache Coherence in Multiprocessors

bvicam.ac.in

... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Huss... more ... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Hussaini, MJ College of Engg. ... ABSTRACT A Multiprocessor System is an interconnection of multiple processors, typically share main memory and execute different programs concurrently. ...

Research paper thumbnail of Designing a Web Education Model For Effective Teaching-Learning Process

bvicam.ac.in

Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, Febru... more Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 – 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi ... Designing a Web Education Model For Effective ...

Research paper thumbnail of Visualization Recommendation for Incremental Data Based on Intent

Lecture Notes in Computer Science, 2023

Research paper thumbnail of Detection of Shotgun Surgery and Message Chain Code Smells using Machine Learning Techniques

IGI Global eBooks, May 13, 2022

Code smell is an inherent property of software that results in design problems which makes the so... more Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measure and area under ROC, yet the tree-based classifiers are performing better than other classifiers.

Research paper thumbnail of Software Component Retrieval Using Rough Sets

Advances in intelligent systems and computing, Jun 13, 2018

Software reusability is one of the important mechanisms needed to maintain its quality and produc... more Software reusability is one of the important mechanisms needed to maintain its quality and productivity. Even though the candidate components are available in the repository to be reused, software engineers prefer to develop the system from scratch. There exists fear of reuse because the developers are not sure whether candidate component will work. In this paper, first the focus is on retrieving the desired components based on rule generation using rough sets. If the component is not found, then it can be developed and stored in repository. Secondly, uncertainty in identifying the desired component is addressed and an approach to model such uncertainty is proposed. Rough set exploration system (RSES) tool is used to simulate the results on certain behaviors of banking domain.

Research paper thumbnail of Prioritize the Code Smells Based on Design Quality Impact

ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2019

Code smell is an indication of design problem or quality in the source code which constantly affe... more Code smell is an indication of design problem or quality in the source code which constantly affect the evolution of a software project. Refactoring is a technique which can remove the code smells to improve the design quality of the code. In the literature, there are many code smells, refactoring techniques, and refactoring tools. However, a software project often contains thousands of code smells and many of them have no relation to design quality. It is a challenge for developers to decide which kind of code smell should be refactored first. The state of the art techniques fall short in assisting developers in the prioritize of code smell shows the impact on design quality. In this paper, we have chosen 4 code smells and found the relationship among them with the help of dependency finder tool. With this finding, we are analyzing and prioritizing the code smells based on design quality. In this way, the code smell ordering (prioritize the code smells) is recommended to the developers which one to refactor first. The suggested order may dispel some of the code smell or may dispel some of possible refactoring techniques of the code smell in the large software project. We have evaluated, recommended order on simple java source code and the results show that the order which we suggested has more impacted on design quality.

Research paper thumbnail of Towards Truly Smart City Service Providers: A View on On-Demand Everything as a Services

Journal of critical reviews, 2020

Internet of Things (IoT) connects a large number of devices/objects, and these devices are being ... more Internet of Things (IoT) connects a large number of devices/objects, and these devices are being increased that it is foretold their number will reach billions in the near future, and hence increasing the number of IoT-based services. IoT is built on and integrated with many existing technologies (e.g., wireless sensors, mobile computing, and cloud) which support its spreading and scalability and help it to overcome its known challenges like limited resources. Moreover, service composition supports IoT in the rapid development of new IoT applications leveraging the existing services. These paradigms and techniques are fundamental building blocks and enablers of smart cities. IoT service composition and IoT integration with the above-stated technologies have been addressed in research and industry works. In this paper, we review several types compositions and give our view on future smart city service providers. We also propose a location-aware architecture for integrating IoT services and mobile application services. The proposal is illustrated based on shopping mall scenario, and the high-level architecture is presented in this work.

Research paper thumbnail of Personalized Dynamic Learning Plan Generator for Smart Learning Environments

International Journal of Recent Technology and Engineering (IJRTE), 2019

Transition of traditional online learning towards the Smart learning environments requires adapta... more Transition of traditional online learning towards the Smart learning environments requires adaptation of the smart features. Personalized assistance is one of the most required characteristic. Learning plans are important building blocks for any teaching learning paradigms. Often an instructor makes a learning plan keeping stakeholders into consideration. However in an online learning environment the stakeholders are not able to adapt to these static plans as there is no personalization involved. As a result there is a considerable increase in dropout rates. Hence there is a need for adaptive learning plans which aims for dynamic adjustment of schedules/learning plans that may help in successful completion of course. This paper presents an approach for dynamic learning plan generator and also proposes a revised Learning plan template to achieve personalized assistance in Smart learning environments. The responses of stakeholders on traditional learning plans and that of individualiz...

Research paper thumbnail of A holistic rubric for assessment of software requirements specification

2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH), 2017

Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scorin... more Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scoring guide that is used for assessing students learning outcomes. IEEE 830.1998 is a IEEE recommended practice for Software Requirements Specification. The design of rubrics for standard templates like that of IEEE SRS helps in assessing several projects with uniform scaling. In this work, a holistic rubric is created for IEEE 830.1998 standard SRS template assessment. This rubric is applied on the actual students submissions over Moodle platform. The results show that the traditional assessment by the faculty and the proposed rubric based assessment matches closely and provides scope for the course development through formative assessment.

Research paper thumbnail of A Framework Studio for Component Reusability

The deployment of a software product requires considerable amount of time and effort. In order to... more The deployment of a software product requires considerable amount of time and effort. In order to increase the productivity of the software products, reusability strategies were proposed in the literature. However effective reuse is still a challenging issue. This paper presents a framework studio for effective components reusability which provides the selection of components from framework studio and generation of source code based on stakeholders needs. The framework studio is implemented using swings which are integrated onto the Net Beans IDE which help in faster generation of the source code.

Research paper thumbnail of Method Level Code Smells: Chernoff Face Visualization

Software that is badly written and prone to design problems often smells. Code smells results in ... more Software that is badly written and prone to design problems often smells. Code smells results in design anomalies that make software hard to understand and maintain. Several tools and techniques available in literature helps in detection of code smells. But the severity of the smells in the code is often not known immediately as it lacks visualization. In this paper, two method level code smells namely long method and feature envy are visualized using chernoff faces. Techniques proposed in literature either use knowledge driven approach or data driven approach for code smell detection. In the proposed approach a fusion of both knowledge and data driven approach is used to identify the most relevant features. These most relevant features are mapped to the 15 desired features of chernoff faces to visualize the behavior of the code. The result shows that almost 95% of the smells are visualized correctly. This helps in analyzing the programmer’s capability in maintaining quality of sour...

Research paper thumbnail of Enhanced layered fog architecture for IoT sensing and actuation as a service

Scientific Reports, 2021

The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in ... more The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is ...

Research paper thumbnail of Blockchain Enabled Smart Learning Environment Framework

Learning and Analytics in Intelligent Systems, 2019

Smart learning provides a holistic learning to students with a major paradigm shift by using mode... more Smart learning provides a holistic learning to students with a major paradigm shift by using modern day technologies. The Learning Management systems are mostly built using traditional standard frameworks like that of IEEE Learning Technology Systems Architecture (LTSA). These frameworks are not suitable to smart learning environment as they lack several desired features to qualify for smartness levels in learning. In this paper a modified block chain enabled LTSA framework is proposed to realize the sense level of smartness. The proposed framework is evaluated for various security threats suitable in virtual learning. The risk impact factor for several threats is compared for several threat patterns and it is observed that risk impact factor sufficiently reduced in the proposed framework as compared to that of LTSA.

Research paper thumbnail of Model Based Software Development: Issues Challenges

International Journal of Computer Science and Informatics, 2013

One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.

Research paper thumbnail of Single Lock Manager Approach for Achieving Concurrency Control in Mobile Environments

Lecture Notes in Computer Science

In a mobile computing environment, users can perform on-line transaction processing independent o... more In a mobile computing environment, users can perform on-line transaction processing independent of their physical location. In a mobile environment, multiple mobile hosts may update the data simultaneously which may result in inconsistency of data. To solve such problems many concurrency control techniques have been proposed. The traditional two phase locking protocol has some inherent problems such as deadlocks &

Research paper thumbnail of Concurrency Control in Mobile Environments: Issues & Challenges

International Journal of Database Management Systems, 2011

The use of data services from handheld devices has increased exponentially resulting in several c... more The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.

Research paper thumbnail of Extraction of State Transition Diagrams from Legacy C++ Application

Procedia Technology, 2012

Research paper thumbnail of A Methodology To Manage Victim Components Using Cbo Measure

International Journal of Software Engineering & Applications, 2012

Research paper thumbnail of An Analytical Approach for Guaranteeing Concurrency in Mobile Environments

Research paper thumbnail of An Algorithmic approach for achieving Concurrency in Mobile Environment

ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving da... more ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving data consistency. Due to concurrent executions, transactions initiated by mobile hosts may make the data inconsistent when accessing the same resource. Uneven delay by a mobile host in committing a particular transaction may make other hosts accessing the same resource to wait for an invariant time. This may lead to starvation. This paper proposes an algorithmic approach for preserving consistency during concurrent executions. A simulator, based on this algorithm is build to verify the proposal using the row locking mechanism

Research paper thumbnail of Exploiting Shared Cache For Cache Coherence in Multiprocessors

bvicam.ac.in

... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Huss... more ... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Hussaini, MJ College of Engg. ... ABSTRACT A Multiprocessor System is an interconnection of multiple processors, typically share main memory and execute different programs concurrently. ...

Research paper thumbnail of Designing a Web Education Model For Effective Teaching-Learning Process

bvicam.ac.in

Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, Febru... more Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 – 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi ... Designing a Web Education Model For Effective ...