International Journal of Education and Management Engineering @ijeme
Статьи журнала - International Journal of Education and Management Engineering
Все статьи: 625

Evacuation Simulation of Counter-current Behavior Using Agent Model for Pedestrian Dynamics
Статья научная
It is an important issue that all occupants should be able to evacuate to safety from sports stadium under emergency. The behavior of occupants is quite complex, and individual behavior will greatly affect the result of the evacuation. Such as the phenomenon of counter-current behavior, sub-group behavior, following behavior and so on. In this paper, we mainly study the counter-current behavior, and a system simulation model is presented, which based on the agent technology. And in order to study the effect on evacuation, two cases have been studied to analyze the impact of evacuation. Simulation processes and results display that the counter-current behavior will be harmful for the movements of people. Simulation processes and results display that the model is very close to real movements of people.
Бесплатно

Статья научная
This paper is dedicated to a comprehensive analysis of hybrid energy options, with a specific focus on exploring their economic and environmental advantages within the context of an ice cream factory located in Fukuoka, Japan. The study takes a holistic approach, delving into various facets such as power generation, energy expenses, and related factors to uncover the potential benefits associated with specific configurations of hybrid energy solutions. The analysis presented in this study serves as a valuable tool for assessing the impact of different power generation technologies and energy management strategies. It sheds light on how these choices can influence not only the factory's operational costs but also its environmental footprint. By quantifying these effects, the study provides critical insights that can guide decision-makers toward more sustainable and economically sound energy solutions. As a forward-looking application approach, this research envisions the utilization of a PV-wind-diesel-grid-electrolyzer power system. This hybrid configuration serves as a versatile platform for conducting simulation studies, allowing for the exploration of a wide spectrum of potentially viable solutions. The insights derived from these simulations not only facilitate informed decision-making but also pave the way for anticipating and strategically planning future energy implementations. In essence, this study represents a proactive and data-driven approach to energy optimization, offering the ice cream factory in Fukuoka a roadmap to harnessing the benefits of hybrid energy systems, ultimately contributing to both economic efficiency and environmental sustainability. So, at a cost of energy (COE) of 18.313¥ per kWh, this arrangement stands out as an economically advantageous and environmentally friendly solution for the electrification of the ice cream factory.
Бесплатно

Статья научная
Key Process Areas (KPAs) for Software Engineering Institute (SEI) Maturity Level 4 can be described in terms of Quantitative Process Management (QPM) which is the metric to control the quantitative performance of a software project. On the other hand, Software Quality Management (SQM) monitors and controls the quality of the project. The survey conducted in this paper covers around 20 software houses of Pakistan. The study revealed that there is weakness in both KPAs, SQM and QPM. Each KPA defines a set of rules that are necessary to be followed to meet the standard but many organizations fail to follow these rules defined in every KPA. If specified and appropriate measures are taken, the software industry will lift it up to the higher CMMI Level.
Бесплатно

Статья научная
With the development of technology the use of Computer Aided Diagnosis has become a key for breast cancer diagnosis. It is important to increase the accuracy and effective of such systems. The concept of data mining can be applied on the data gathered through such systems for prediction and prevention of breast cancer. In this research, we have conducted the comparison between seven classification algorithms with the help of WEKA (The Waikato Environment for Knowledge Analysis) tool on the 569 instances (10 nucleus attributes) of data with two classes Malignant(M) and Benign (B) of breast cancer aspirate cells. Furthermore the influence of each attribute on prediction was evaluated. The accuracy of these algorithms was above 91% with the highest value of 94.02% for random forest and the predictive power of conclave points was highest whereas lowest was of Fractal Dimension.
Бесплатно

Evaluation of Machine Learning Techniques for Email Spam Classification
Статья научная
Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices. Millions of users worldwide use email to exchange data and information between email servers. On the other hand, unwanted emails or spam became phenomenon challenging major companies and organizations due to the volume of spam which is increasing dramatically every year. Spam is annoying and may contain harmful contents. In addition, spam consume computers, servers, and network resources, causes harmful bottleneck, effect on computing memory and speed of digital devices. Moreover, the time consumed by the users to remove unwanted emails is huge. There are many methods developed to filter spam like keyword matching blacklist/whitelist and header information processing. Though, classical methods like blocking the source to prevent the spam are not effective. This study demonstrates and reviews the performance evaluation of the most popular and effective machine learning techniques and algorithms such as Support Vector Machine, ANN, J48, and Naïve Bayes for email spam classification and filtering. In con conclusion, support vector machine performs better than any individual algorithm in term of accuracy. This research contributes on the for the development of methods and techniques for better detection and prevention of spam.
Бесплатно

Evaluation of Voice & Ear Biometrics Authentication System
Статья научная
The core aim of biometrics authentication methods and technologies is to solve issues and concerns existing in traditional authentication methods like passwords, PIN numbers or identity cards. The Most important concern for business sectors and organizations is to authenticate individuals who interact with them and their services. By considering more than one biometric technology, the authentication process is expected to be more reliable and secure. The Ear and Voice Multimodal Biometrics System is evaluated to compare its performance with ear and voice unimodal systems; the multimodal system takes advantages of the permanence characteristic of ear biometric and voice biometric which is highly acceptable by users. According to the experiment, the ear and voice multimodal system provides better performance than the ear or voice unimodal system. In addition to that, the multimodal system makes a right balance between false rejection and false acceptance rates. This evaluation is intended to contribute to multimodal biometrics research by using behavioral biometric (voice print) and physiological biometric (ear-print) and makes advantage of using both of them in one system.
Бесплатно

Event Stream Processing in BRT Environment
Статья научная
Bus Rapid Transit (BRT) system is a kind of Intelligent Transportation System (ITS), which combines wireless communications, computational technologies, floating car data/floating cellular data technologies, inductive loop detection and so on. The GPS (Global Position System) data and the loop detection data are arriving at the BRT dispatch center massively at the same time so the dispatcher can know the real-time status of buses. The passenger flow data are also captured by devices deployed in the stations and then be passed to center too. How to handle those data at low latency and get some events to be used in bus dispatching is really a problem. In this paper, we propose a framework using ESP (event stream processing) technologies that solves the problem more effectively. At last we demonstrate a prototype system implementation that applies in BRT Line 1 project in Beijing.
Бесплатно

Exact Solutions of Kuramoto-Sivashinsky Equation
Статья научная
Many nonlinear partial differential equations admit traveling wave solutions that move at a constant speed without changing their shapes. It is very important and difficult to search the exact travelling wave solutions.In this work, the auxiliary Riccati equation method and the computer symbolic system Maple are used to study exact solutions for the nonlinear Kuramoto-Sivashinsky equation. Maple can help us solve tedious algebraic calculation. Therefore many exact traveling wave solutions are successfully obtained which include some new kink (or anti-kink) wave solutions and periodic wave solutions.
Бесплатно

Experimental Comparison of Mutation Testing Tools for C Sharp Language
Статья научная
Mutation testing is a popular software testing technique, that inject artificial faults into the program and requires test cases to reveal these faults. In this paper, an experimental comparison is analyzed for different types of mutation testing tools in C Sharp language in .NET framework. Different mutation testing tools are giving different mutation score for a program. The objective of this paper is to investigate why the mutation score is different for different tools, and the scope of generating mutants depending on different types of operators. Four tools, such as, Visual Mutator, Cream, Ninja Turtles, and Nester are selected and applied to a program and analyze the outcome. Among these four mutation testing tools, Visual Mutator is better because of its higher mutation score, and it generates mutants for both common and uncommon standard operators and object level operators.
Бесплатно

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool
Статья научная
With the rising importance of the client-side execution scenario, attackers also shifted their focus to the browser based attacks, and compromises based on client devices. Though security experts have come up with various solutions to such attacks but, the attackers at the same time find new ways and technologies to deal with such situations. In this paper, we will discuss about the framework called Metasploit and then we shall define what exactly the Metasploit Framework is and how it can be used in various attack scenarios, this will be followed by a brief description of the terms used including; the exploits, its modules, payloads and meterpreter. Later, the uses of the product will be discussed. The basic purpose of metasploit framework is a module launching, the attacker is able to configure an exploit module and initiate it at a target system. If the exploit succeeds, the payload is executed on the system for which it is targeted and the attacker can interact with the victim machine using the shell created on the host machine. There are number of exploits and payload options available in metasploit framework. It is one of the most useful frameworks as far as the security is concerned. Lastly, we will discuss the method to attack the compromised systems by malicious PDF file using Metasploit Framework. Therefore, the main purpose of this paper is to impart a deep understanding of what Metasploit is and how it can be utilized when one needs to get the access of the local or the remote machine.
Бесплатно

Exploration and Practice for Evaluation of Teaching Methods
Статья научная
This paper discusses one of a series of achievements of teaching reform for the national excellent course "Algorithms and Data Structures". One of the most valuable and most difficult reforms is to strengthen the practical aspects of the curriculum, while strengthening the teacher-student interactive teaching. Another innovation closely related to this teaching reform is a comprehensive scientific evaluation of teaching methods for this complex teaching process. This evaluation method will evaluate the whole process of teaching by a dynamic multi-factor evaluation. It will effectively promote the teaching level continues to increase.
Бесплатно

Exploration and Practice of Graduation Design for Civil Engineering
Статья научная
Aimed at the present situation of the graduation design in Department of Civil and Materials Engineering, Henan University of Urban Construction, the author analyzed the problems in graduate design, focusing on the theme of improving teaching quality, training high quality professionals, from the design layout to adjust the time, conscientiously prepare for early mobilization, rationally choice the design topic to enhance the process of guiding, strengthening teaching stuff, improve the design evaluation system.
Бесплатно

Exploration and Practice of SE-CDIO Educational Pattern
Статья научная
Taking the requirement and the education goal of software engineering application talented person as guidance, referring to advanced ideas of the international CDIO higher engineering education, combining realities of software engineering undergraduate educates, this paper presents that innovative SE-CDIO pattern for the cultivation of software engineers is developed and implemented in curriculum system, practice teaching and other respects in the software engineering undergraduate specialty of Beijing Information Science & Technology University. Through designing SE-CDIO application personnel cultivation program for software engineering undergraduates, carrying out educational reform practice positively, we raise diligently the quality of software engineering undergraduates who conforms to the discipline and social development need, at the same time promote discipline and specialized development.
Бесплатно

Статья научная
In view of the difficulty in employment of computer science major, the further exploration of the new cultivating mode to adapt the social development has been the task at the forefront of the colleges and universities. So, supported by the technological means, the implementation of the undergraduate student tutorial system which follows the principle of “the whole participation, contracting by individual, divide- and-rule”, can make the combination of teaching and moral education in the universities come true, and can make the teaching in accordance with the students’ aptitude to meet the goal of individualized cultivation. It also can be beneficial to the successful operation of credit system thus to cultivate more excellent talents.
Бесплатно

Exploration and Practice on the Integrated Training of Supervisory Control System
Статья научная
The integrated training of supervisory control system (abbreviated as ITSCS), whose main task focuses on using related domain knowledge flexible, is discussed carefully with the background of teaching practice. A schematic diagram illustrating the relationship between these parts is put forward and explained. Organizing various knowledge comprehensively, integrating SIMATIC SIM platform with training efficiently, applying practice project in society with students’ learning in university as much as possible, are all traits of the training. The present limitations and authors’ own considerations about improving the training continually are also discussed at the end.
Бесплатно

Exploration of various clustering algorithms for text mining
Статья научная
Due to the current encroachments in technology and also sharp lessening of storage cost, huge extents of documents are being put away in repositories for future references. At the same time, it is time consuming as well as costly to recover the user intrigued documents, out of these gigantic accumulations. Searching of documents can be made more efficient and effective if documents are clustered on the premise of their contents. This article uncovers a comprehensive discussion on various clustering algorithm used in text mining alongside their merits, demerits and comparisons. Further, author has likewise examined the key challenges of clustering algorithms being used for effective clustering of documents.
Бесплатно

Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot
Статья научная
Computing as a utility has been possible with cloud computing technology. Another technology that has evolved with the internet and has become an inseparable part of our lives is the internet of things (IoT). With the growing use of IoT devices, the data generated and used by them is increasing tremendously, and resource-constrained IoT devices can make use of the cloud for data and computing needs. When IoT and cloud converge there are security and privacy issues as the cloud is a shared resource. Access control mechanisms play an important role in maintaining the security of users' data. Attribute-based encryption provides fine-grained access to data, thus ensuring selective access to data. We review the literature on access control mechanisms for cloud-based IoT and provide an analysis of their strengths and weaknesses. We present a comparison of the mechanisms, highlighting the challenges and open research questions in the field of cloud-based IoT access control and provide suggestions for future research and development. Our findings contribute to the understanding of access control mechanisms for cloud-based IoT and provide insights for their selection and deployment in real-world scenarios.
Бесплатно

Статья научная
This research paper investigates the attitudes and behaviors of Sri Lankan internet users toward passwords and password managers. The study addresses the security flaws and malpractices associated with passwords and aims to identify effective password management solutions. Two surveys were conducted, one focusing on user attitudes and strategies related to passwords, and the other evaluating user experiences with decentralized offline password managers. The findings reveal that a significant portion of the participants employed complex password-creation strategies and utilized various methods for storing and reusing passwords. Male participants and individuals in the 20-29 age group were predominant in the study. Surprisingly, only a minority of participants had received training in password creation and management. The analysis also indicated that participants without training tended to create easily breakable pass-words, while those with training opted for more complex and stronger passwords. In terms of password management methods, participants without training relied on manual note-taking or memorization, while those with training pre-ferred secure password managers. Furthermore, the study found a higher prevalence of password reuse among partici-pants who used manual password creation methods compared to those who used password generators. The research underscores the need for improved password management practices and increased awareness among Sri Lankan internet users. The findings introduce novel insights into the existing knowledge of password management and lay the groundwork for developing targeted interventions and strategies to enhance security in the Sri Lankan online landscape.
Бесплатно

Статья научная
The role played by the E-learning system is crucial, especially in the urgent need for working away from the universities and colleges such as on holidays, weekends, and during pandemic situations like COVID-19. Researchers have constantly been producing more sophisticated alternatives for effective usage of E-learning systems and among them include models which explain how users accept, use, and evaluate such systems as they use them on daily basis. Due to the low ICT readiness in developing nations like Tanzania, there is a lack of grounds for the inclusion of various factors and dimensions to the conceptual models which in turn results in testing incomplete, intuitive, and ad hoc sets or irrelevant dimensions. This study closes this gap by conducting a systematic documentary review of studies from 2007 to 2020 on E-learning systems to identify the key factors and their associated dimensions. The findings provide foundations that further research on e-learning acceptance in the contexts of developing countries including Tanzania can adopt on formulating hypotheses and generating information on their research contexts.
Бесплатно

Exploring the Impact of Innovation between japanese KIBS and Clients
Статья научная
The purpose of this paper is to propose an analytical framework to explain why knowledge intensive business services (KIBS) have become an important strategy for many firms. It will especially examine why the relationships between KIBS and clients are different by analyzing the impact of KIBS for different types of innovation and different divisions, and also what and how the service delivery method contributes to each type of innovation for Japanese manufacturing corporations (JMCs). The results show that firstly, KIBS provide professional knowledge to accelerate the different innovation of their clients; secondly, KIBS contribute more to the radical innovation of a client than incremental innovation; and the thirdly, face-to-face delivery is the most efficient method of service from KIBS to the JMCs.
Бесплатно