Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 625

Evacuation Simulation of Counter-current Behavior Using Agent Model for Pedestrian Dynamics

Evacuation Simulation of Counter-current Behavior Using Agent Model for Pedestrian Dynamics

Xiaoan Zhao, Yanyan You, Ying Zhang

Статья научная

It is an important issue that all occupants should be able to evacuate to safety from sports stadium under emergency. The behavior of occupants is quite complex, and individual behavior will greatly affect the result of the evacuation. Such as the phenomenon of counter-current behavior, sub-group behavior, following behavior and so on. In this paper, we mainly study the counter-current behavior, and a system simulation model is presented, which based on the agent technology. And in order to study the effect on evacuation, two cases have been studied to analyze the impact of evacuation. Simulation processes and results display that the counter-current behavior will be harmful for the movements of people. Simulation processes and results display that the model is very close to real movements of people.

Бесплатно

Evaluating the Feasibility of a Photovoltaic-Fuel Cell Hybrid Energy System for the Ice Cream Factory in Fukuoka City, Japan: An Economic and Technical Analysis

Evaluating the Feasibility of a Photovoltaic-Fuel Cell Hybrid Energy System for the Ice Cream Factory in Fukuoka City, Japan: An Economic and Technical Analysis

Md. Ahsan Habib, Sumon Kumar Debnath, Md. Shahin Parvej, Jannatun Ferdous, Md. Ali Asgar, Md. Ahasan Habib, Md. Asaduzzaman Jemy

Статья научная

This paper is dedicated to a comprehensive analysis of hybrid energy options, with a specific focus on exploring their economic and environmental advantages within the context of an ice cream factory located in Fukuoka, Japan. The study takes a holistic approach, delving into various facets such as power generation, energy expenses, and related factors to uncover the potential benefits associated with specific configurations of hybrid energy solutions. The analysis presented in this study serves as a valuable tool for assessing the impact of different power generation technologies and energy management strategies. It sheds light on how these choices can influence not only the factory's operational costs but also its environmental footprint. By quantifying these effects, the study provides critical insights that can guide decision-makers toward more sustainable and economically sound energy solutions. As a forward-looking application approach, this research envisions the utilization of a PV-wind-diesel-grid-electrolyzer power system. This hybrid configuration serves as a versatile platform for conducting simulation studies, allowing for the exploration of a wide spectrum of potentially viable solutions. The insights derived from these simulations not only facilitate informed decision-making but also pave the way for anticipating and strategically planning future energy implementations. In essence, this study represents a proactive and data-driven approach to energy optimization, offering the ice cream factory in Fukuoka a roadmap to harnessing the benefits of hybrid energy systems, ultimately contributing to both economic efficiency and environmental sustainability. So, at a cost of energy (COE) of 18.313¥ per kWh, this arrangement stands out as an economically advantageous and environmentally friendly solution for the electrification of the ice cream factory.

Бесплатно

Evaluation Study of Software Quality Management ‎‎(SQM) and Quantitative Process Management ‎‎(QPM) in Pakistan Software Houses

Evaluation Study of Software Quality Management ‎‎(SQM) and Quantitative Process Management ‎‎(QPM) in Pakistan Software Houses

Muhammad Haroon

Статья научная

Key Process Areas (KPAs) for ‎Software Engineering Institute (SEI) Maturity ‎Level 4 can be described in terms of Quantitative ‎Process Management (QPM) which is the metric ‎to control the quantitative performance of a ‎software project. On the other hand, Software ‎Quality Management (SQM) monitors and ‎controls the quality of the project. The survey ‎conducted in this paper covers around 20 ‎software houses of Pakistan. The study revealed ‎that there is weakness in both KPAs, SQM and ‎QPM. Each KPA defines a set of rules that are necessary to be followed to meet the standard but many organizations fail to follow these rules defined in every KPA. If specified and ‎appropriate measures are taken, the software ‎industry will lift it up to the higher CMMI Level.‎

Бесплатно

Evaluation of Data Mining Categorization Algorithms on Aspirates Nucleus Features for Breast Cancer Prediction and Detection

Evaluation of Data Mining Categorization Algorithms on Aspirates Nucleus Features for Breast Cancer Prediction and Detection

Gajendra Sharma

Статья научная

With the development of technology the use of Computer Aided Diagnosis has become a key for breast cancer diagnosis. It is important to increase the accuracy and effective of such systems. The concept of data mining can be applied on the data gathered through such systems for prediction and prevention of breast cancer. In this research, we have conducted the comparison between seven classification algorithms with the help of WEKA (The Waikato Environment for Knowledge Analysis) tool on the 569 instances (10 nucleus attributes) of data with two classes Malignant(M) and Benign (B) of breast cancer aspirate cells. Furthermore the influence of each attribute on prediction was evaluated. The accuracy of these algorithms was above 91% with the highest value of 94.02% for random forest and the predictive power of conclave points was highest whereas lowest was of Fractal Dimension.

Бесплатно

Evaluation of Machine Learning Techniques for Email Spam Classification

Evaluation of Machine Learning Techniques for Email Spam Classification

Mahmoud Jazzar, Rasheed F. Yousef, Derar Eleyan

Статья научная

Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices. Millions of users worldwide use email to exchange data and information between email servers. On the other hand, unwanted emails or spam became phenomenon challenging major companies and organizations due to the volume of spam which is increasing dramatically every year. Spam is annoying and may contain harmful contents. In addition, spam consume computers, servers, and network resources, causes harmful bottleneck, effect on computing memory and speed of digital devices. Moreover, the time consumed by the users to remove unwanted emails is huge. There are many methods developed to filter spam like keyword matching blacklist/whitelist and header information processing. Though, classical methods like blocking the source to prevent the spam are not effective. This study demonstrates and reviews the performance evaluation of the most popular and effective machine learning techniques and algorithms such as Support Vector Machine, ANN, J48, and Naïve Bayes for email spam classification and filtering. In con conclusion, support vector machine performs better than any individual algorithm in term of accuracy. This research contributes on the for the development of methods and techniques for better detection and prevention of spam.

Бесплатно

Evaluation of Voice & Ear Biometrics Authentication System

Evaluation of Voice & Ear Biometrics Authentication System

Safiia Mohammed, Michael Hegarty

Статья научная

The core aim of biometrics authentication methods and technologies is to solve issues and concerns existing in traditional authentication methods like passwords, PIN numbers or identity cards. The Most important concern for business sectors and organizations is to authenticate individuals who interact with them and their services. By considering more than one biometric technology, the authentication process is expected to be more reliable and secure. The Ear and Voice Multimodal Biometrics System is evaluated to compare its performance with ear and voice unimodal systems; the multimodal system takes advantages of the permanence characteristic of ear biometric and voice biometric which is highly acceptable by users. According to the experiment, the ear and voice multimodal system provides better performance than the ear or voice unimodal system. In addition to that, the multimodal system makes a right balance between false rejection and false acceptance rates. This evaluation is intended to contribute to multimodal biometrics research by using behavioral biometric (voice print) and physiological biometric (ear-print) and makes advantage of using both of them in one system.

Бесплатно

Event Stream Processing in BRT Environment

Event Stream Processing in BRT Environment

Wenfeng Liu

Статья научная

Bus Rapid Transit (BRT) system is a kind of Intelligent Transportation System (ITS), which combines wireless communications, computational technologies, floating car data/floating cellular data technologies, inductive loop detection and so on. The GPS (Global Position System) data and the loop detection data are arriving at the BRT dispatch center massively at the same time so the dispatcher can know the real-time status of buses. The passenger flow data are also captured by devices deployed in the stations and then be passed to center too. How to handle those data at low latency and get some events to be used in bus dispatching is really a problem. In this paper, we propose a framework using ESP (event stream processing) technologies that solves the problem more effectively. At last we demonstrate a prototype system implementation that applies in BRT Line 1 project in Beijing.

Бесплатно

Exact Solutions of Kuramoto-Sivashinsky Equation

Exact Solutions of Kuramoto-Sivashinsky Equation

Dahe Feng

Статья научная

Many nonlinear partial differential equations admit traveling wave solutions that move at a constant speed without changing their shapes. It is very important and difficult to search the exact travelling wave solutions.In this work, the auxiliary Riccati equation method and the computer symbolic system Maple are used to study exact solutions for the nonlinear Kuramoto-Sivashinsky equation. Maple can help us solve tedious algebraic calculation. Therefore many exact traveling wave solutions are successfully obtained which include some new kink (or anti-kink) wave solutions and periodic wave solutions.

Бесплатно

Experimental Comparison of Mutation Testing Tools for C Sharp Language

Experimental Comparison of Mutation Testing Tools for C Sharp Language

Tariful Alam, A. G. M. Zaman

Статья научная

Mutation testing is a popular software testing technique, that inject artificial faults into the program and requires test cases to reveal these faults. In this paper, an experimental comparison is analyzed for different types of mutation testing tools in C Sharp language in .NET framework. Different mutation testing tools are giving different mutation score for a program. The objective of this paper is to investigate why the mutation score is different for different tools, and the scope of generating mutants depending on different types of operators. Four tools, such as, Visual Mutator, Cream, Ninja Turtles, and Nester are selected and applied to a program and analyze the outcome. Among these four mutation testing tools, Visual Mutator is better because of its higher mutation score, and it generates mutants for both common and uncommon standard operators and object level operators.

Бесплатно

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

Ritu Choudhary, Mehak Khurana

Статья научная

With the rising importance of the client-side execution scenario, attackers also shifted their focus to the browser based attacks, and compromises based on client devices. Though security experts have come up with various solutions to such attacks but, the attackers at the same time find new ways and technologies to deal with such situations. In this paper, we will discuss about the framework called Metasploit and then we shall define what exactly the Metasploit Framework is and how it can be used in various attack scenarios, this will be followed by a brief description of the terms used including; the exploits, its modules, payloads and meterpreter. Later, the uses of the product will be discussed. The basic purpose of metasploit framework is a module launching, the attacker is able to configure an exploit module and initiate it at a target system. If the exploit succeeds, the payload is executed on the system for which it is targeted and the attacker can interact with the victim machine using the shell created on the host machine. There are number of exploits and payload options available in metasploit framework. It is one of the most useful frameworks as far as the security is concerned. Lastly, we will discuss the method to attack the compromised systems by malicious PDF file using Metasploit Framework. Therefore, the main purpose of this paper is to impart a deep understanding of what Metasploit is and how it can be utilized when one needs to get the access of the local or the remote machine.

Бесплатно

Exploration and Practice for Evaluation of Teaching Methods

Exploration and Practice for Evaluation of Teaching Methods

Xiaodong Wang, Yingjie Wu

Статья научная

This paper discusses one of a series of achievements of teaching reform for the national excellent course "Algorithms and Data Structures". One of the most valuable and most difficult reforms is to strengthen the practical aspects of the curriculum, while strengthening the teacher-student interactive teaching. Another innovation closely related to this teaching reform is a comprehensive scientific evaluation of teaching methods for this complex teaching process. This evaluation method will evaluate the whole process of teaching by a dynamic multi-factor evaluation. It will effectively promote the teaching level continues to increase.

Бесплатно

Exploration and Practice of Graduation Design for Civil Engineering

Exploration and Practice of Graduation Design for Civil Engineering

MA Zhe, HAO Xiao

Статья научная

Aimed at the present situation of the graduation design in Department of Civil and Materials Engineering, Henan University of Urban Construction, the author analyzed the problems in graduate design, focusing on the theme of improving teaching quality, training high quality professionals, from the design layout to adjust the time, conscientiously prepare for early mobilization, rationally choice the design topic to enhance the process of guiding, strengthening teaching stuff, improve the design evaluation system.

Бесплатно

Exploration and Practice of SE-CDIO Educational Pattern

Exploration and Practice of SE-CDIO Educational Pattern

Liu Jian-Bin, Yang Zhi-Yun

Статья научная

Taking the requirement and the education goal of software engineering application talented person as guidance, referring to advanced ideas of the international CDIO higher engineering education, combining realities of software engineering undergraduate educates, this paper presents that innovative SE-CDIO pattern for the cultivation of software engineers is developed and implemented in curriculum system, practice teaching and other respects in the software engineering undergraduate specialty of Beijing Information Science & Technology University. Through designing SE-CDIO application personnel cultivation program for software engineering undergraduates, carrying out educational reform practice positively, we raise diligently the quality of software engineering undergraduates who conforms to the discipline and social development need, at the same time promote discipline and specialized development.

Бесплатно

Exploration and Practice on Reformation Mode of Undergraduate Tutorial System in Faculty of Computer Science

Exploration and Practice on Reformation Mode of Undergraduate Tutorial System in Faculty of Computer Science

Ma Fu, Yang Ping, Wang Xuetong, Cui Ying'an

Статья научная

In view of the difficulty in employment of computer science major, the further exploration of the new cultivating mode to adapt the social development has been the task at the forefront of the colleges and universities. So, supported by the technological means, the implementation of the undergraduate student tutorial system which follows the principle of “the whole participation, contracting by individual, divide- and-rule”, can make the combination of teaching and moral education in the universities come true, and can make the teaching in accordance with the students’ aptitude to meet the goal of individualized cultivation. It also can be beneficial to the successful operation of credit system thus to cultivate more excellent talents.

Бесплатно

Exploration and Practice on the Integrated Training of Supervisory Control System

Exploration and Practice on the Integrated Training of Supervisory Control System

Xiaolin Feng, Haijie Mao, Zhanming Li, Hui Chen

Статья научная

The integrated training of supervisory control system (abbreviated as ITSCS), whose main task focuses on using related domain knowledge flexible, is discussed carefully with the background of teaching practice. A schematic diagram illustrating the relationship between these parts is put forward and explained. Organizing various knowledge comprehensively, integrating SIMATIC SIM platform with training efficiently, applying practice project in society with students’ learning in university as much as possible, are all traits of the training. The present limitations and authors’ own considerations about improving the training continually are also discussed at the end.

Бесплатно

Exploration of various clustering algorithms for text mining

Exploration of various clustering algorithms for text mining

Neha Garg, R.K. Gupta

Статья научная

Due to the current encroachments in technology and also sharp lessening of storage cost, huge extents of documents are being put away in repositories for future references. At the same time, it is time consuming as well as costly to recover the user intrigued documents, out of these gigantic accumulations. Searching of documents can be made more efficient and effective if documents are clustered on the premise of their contents. This article uncovers a comprehensive discussion on various clustering algorithm used in text mining alongside their merits, demerits and comparisons. Further, author has likewise examined the key challenges of clustering algorithms being used for effective clustering of documents.

Бесплатно

Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot

Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot

Keerti Naregal, Vijay Kalmani

Статья научная

Computing as a utility has been possible with cloud computing technology. Another technology that has evolved with the internet and has become an inseparable part of our lives is the internet of things (IoT). With the growing use of IoT devices, the data generated and used by them is increasing tremendously, and resource-constrained IoT devices can make use of the cloud for data and computing needs. When IoT and cloud converge there are security and privacy issues as the cloud is a shared resource. Access control mechanisms play an important role in maintaining the security of users' data. Attribute-based encryption provides fine-grained access to data, thus ensuring selective access to data. We review the literature on access control mechanisms for cloud-based IoT and provide an analysis of their strengths and weaknesses. We present a comparison of the mechanisms, highlighting the challenges and open research questions in the field of cloud-based IoT access control and provide suggestions for future research and development. Our findings contribute to the understanding of access control mechanisms for cloud-based IoT and provide insights for their selection and deployment in real-world scenarios.

Бесплатно

Exploring Perceptions and Habits of Sri Lankan Users: A Study on Password Management and Adoption of Password Managers

Exploring Perceptions and Habits of Sri Lankan Users: A Study on Password Management and Adoption of Password Managers

Prageeth Fernando

Статья научная

This research paper investigates the attitudes and behaviors of Sri Lankan internet users toward passwords and password managers. The study addresses the security flaws and malpractices associated with passwords and aims to identify effective password management solutions. Two surveys were conducted, one focusing on user attitudes and strategies related to passwords, and the other evaluating user experiences with decentralized offline password managers. The findings reveal that a significant portion of the participants employed complex password-creation strategies and utilized various methods for storing and reusing passwords. Male participants and individuals in the 20-29 age group were predominant in the study. Surprisingly, only a minority of participants had received training in password creation and management. The analysis also indicated that participants without training tended to create easily breakable pass-words, while those with training opted for more complex and stronger passwords. In terms of password management methods, participants without training relied on manual note-taking or memorization, while those with training pre-ferred secure password managers. Furthermore, the study found a higher prevalence of password reuse among partici-pants who used manual password creation methods compared to those who used password generators. The research underscores the need for improved password management practices and increased awareness among Sri Lankan internet users. The findings introduce novel insights into the existing knowledge of password management and lay the groundwork for developing targeted interventions and strategies to enhance security in the Sri Lankan online landscape.

Бесплатно

Exploring the Factors and Dimensions of Information Quality for E-learning Systems: A case of Tanzanian Higher Learning Institution

Exploring the Factors and Dimensions of Information Quality for E-learning Systems: A case of Tanzanian Higher Learning Institution

Renatus Mushi, Deogratius M. Lashayo

Статья научная

The role played by the E-learning system is crucial, especially in the urgent need for working away from the universities and colleges such as on holidays, weekends, and during pandemic situations like COVID-19. Researchers have constantly been producing more sophisticated alternatives for effective usage of E-learning systems and among them include models which explain how users accept, use, and evaluate such systems as they use them on daily basis. Due to the low ICT readiness in developing nations like Tanzania, there is a lack of grounds for the inclusion of various factors and dimensions to the conceptual models which in turn results in testing incomplete, intuitive, and ad hoc sets or irrelevant dimensions. This study closes this gap by conducting a systematic documentary review of studies from 2007 to 2020 on E-learning systems to identify the key factors and their associated dimensions. The findings provide foundations that further research on e-learning acceptance in the contexts of developing countries including Tanzania can adopt on formulating hypotheses and generating information on their research contexts.

Бесплатно

Exploring the Impact of Innovation between japanese KIBS and Clients

Exploring the Impact of Innovation between japanese KIBS and Clients

CAO Yong, LI Yang, NAGAHIRA Akio

Статья научная

The purpose of this paper is to propose an analytical framework to explain why knowledge intensive business services (KIBS) have become an important strategy for many firms. It will especially examine why the relationships between KIBS and clients are different by analyzing the impact of KIBS for different types of innovation and different divisions, and also what and how the service delivery method contributes to each type of innovation for Japanese manufacturing corporations (JMCs). The results show that firstly, KIBS provide professional knowledge to accelerate the different innovation of their clients; secondly, KIBS contribute more to the radical innovation of a client than incremental innovation; and the thirdly, face-to-face delivery is the most efficient method of service from KIBS to the JMCs.

Бесплатно

Журнал