Статьи журнала - International Journal of Education and Management Engineering
Все статьи: 613
Exploitation of PDF Reader Vulnerabilities using Metasploit Tool
Статья научная
With the rising importance of the client-side execution scenario, attackers also shifted their focus to the browser based attacks, and compromises based on client devices. Though security experts have come up with various solutions to such attacks but, the attackers at the same time find new ways and technologies to deal with such situations. In this paper, we will discuss about the framework called Metasploit and then we shall define what exactly the Metasploit Framework is and how it can be used in various attack scenarios, this will be followed by a brief description of the terms used including; the exploits, its modules, payloads and meterpreter. Later, the uses of the product will be discussed. The basic purpose of metasploit framework is a module launching, the attacker is able to configure an exploit module and initiate it at a target system. If the exploit succeeds, the payload is executed on the system for which it is targeted and the attacker can interact with the victim machine using the shell created on the host machine. There are number of exploits and payload options available in metasploit framework. It is one of the most useful frameworks as far as the security is concerned. Lastly, we will discuss the method to attack the compromised systems by malicious PDF file using Metasploit Framework. Therefore, the main purpose of this paper is to impart a deep understanding of what Metasploit is and how it can be utilized when one needs to get the access of the local or the remote machine.
Бесплатно
Exploration and Practice for Evaluation of Teaching Methods
Статья научная
This paper discusses one of a series of achievements of teaching reform for the national excellent course "Algorithms and Data Structures". One of the most valuable and most difficult reforms is to strengthen the practical aspects of the curriculum, while strengthening the teacher-student interactive teaching. Another innovation closely related to this teaching reform is a comprehensive scientific evaluation of teaching methods for this complex teaching process. This evaluation method will evaluate the whole process of teaching by a dynamic multi-factor evaluation. It will effectively promote the teaching level continues to increase.
Бесплатно
Exploration and Practice of Graduation Design for Civil Engineering
Статья научная
Aimed at the present situation of the graduation design in Department of Civil and Materials Engineering, Henan University of Urban Construction, the author analyzed the problems in graduate design, focusing on the theme of improving teaching quality, training high quality professionals, from the design layout to adjust the time, conscientiously prepare for early mobilization, rationally choice the design topic to enhance the process of guiding, strengthening teaching stuff, improve the design evaluation system.
Бесплатно
Exploration and Practice of SE-CDIO Educational Pattern
Статья научная
Taking the requirement and the education goal of software engineering application talented person as guidance, referring to advanced ideas of the international CDIO higher engineering education, combining realities of software engineering undergraduate educates, this paper presents that innovative SE-CDIO pattern for the cultivation of software engineers is developed and implemented in curriculum system, practice teaching and other respects in the software engineering undergraduate specialty of Beijing Information Science & Technology University. Through designing SE-CDIO application personnel cultivation program for software engineering undergraduates, carrying out educational reform practice positively, we raise diligently the quality of software engineering undergraduates who conforms to the discipline and social development need, at the same time promote discipline and specialized development.
Бесплатно
Статья научная
In view of the difficulty in employment of computer science major, the further exploration of the new cultivating mode to adapt the social development has been the task at the forefront of the colleges and universities. So, supported by the technological means, the implementation of the undergraduate student tutorial system which follows the principle of “the whole participation, contracting by individual, divide- and-rule”, can make the combination of teaching and moral education in the universities come true, and can make the teaching in accordance with the students’ aptitude to meet the goal of individualized cultivation. It also can be beneficial to the successful operation of credit system thus to cultivate more excellent talents.
Бесплатно
Exploration and Practice on the Integrated Training of Supervisory Control System
Статья научная
The integrated training of supervisory control system (abbreviated as ITSCS), whose main task focuses on using related domain knowledge flexible, is discussed carefully with the background of teaching practice. A schematic diagram illustrating the relationship between these parts is put forward and explained. Organizing various knowledge comprehensively, integrating SIMATIC SIM platform with training efficiently, applying practice project in society with students’ learning in university as much as possible, are all traits of the training. The present limitations and authors’ own considerations about improving the training continually are also discussed at the end.
Бесплатно
Exploration of various clustering algorithms for text mining
Статья научная
Due to the current encroachments in technology and also sharp lessening of storage cost, huge extents of documents are being put away in repositories for future references. At the same time, it is time consuming as well as costly to recover the user intrigued documents, out of these gigantic accumulations. Searching of documents can be made more efficient and effective if documents are clustered on the premise of their contents. This article uncovers a comprehensive discussion on various clustering algorithm used in text mining alongside their merits, demerits and comparisons. Further, author has likewise examined the key challenges of clustering algorithms being used for effective clustering of documents.
Бесплатно
Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot
Статья научная
Computing as a utility has been possible with cloud computing technology. Another technology that has evolved with the internet and has become an inseparable part of our lives is the internet of things (IoT). With the growing use of IoT devices, the data generated and used by them is increasing tremendously, and resource-constrained IoT devices can make use of the cloud for data and computing needs. When IoT and cloud converge there are security and privacy issues as the cloud is a shared resource. Access control mechanisms play an important role in maintaining the security of users' data. Attribute-based encryption provides fine-grained access to data, thus ensuring selective access to data. We review the literature on access control mechanisms for cloud-based IoT and provide an analysis of their strengths and weaknesses. We present a comparison of the mechanisms, highlighting the challenges and open research questions in the field of cloud-based IoT access control and provide suggestions for future research and development. Our findings contribute to the understanding of access control mechanisms for cloud-based IoT and provide insights for their selection and deployment in real-world scenarios.
Бесплатно
Статья научная
This research paper investigates the attitudes and behaviors of Sri Lankan internet users toward passwords and password managers. The study addresses the security flaws and malpractices associated with passwords and aims to identify effective password management solutions. Two surveys were conducted, one focusing on user attitudes and strategies related to passwords, and the other evaluating user experiences with decentralized offline password managers. The findings reveal that a significant portion of the participants employed complex password-creation strategies and utilized various methods for storing and reusing passwords. Male participants and individuals in the 20-29 age group were predominant in the study. Surprisingly, only a minority of participants had received training in password creation and management. The analysis also indicated that participants without training tended to create easily breakable pass-words, while those with training opted for more complex and stronger passwords. In terms of password management methods, participants without training relied on manual note-taking or memorization, while those with training pre-ferred secure password managers. Furthermore, the study found a higher prevalence of password reuse among partici-pants who used manual password creation methods compared to those who used password generators. The research underscores the need for improved password management practices and increased awareness among Sri Lankan internet users. The findings introduce novel insights into the existing knowledge of password management and lay the groundwork for developing targeted interventions and strategies to enhance security in the Sri Lankan online landscape.
Бесплатно
Статья научная
The role played by the E-learning system is crucial, especially in the urgent need for working away from the universities and colleges such as on holidays, weekends, and during pandemic situations like COVID-19. Researchers have constantly been producing more sophisticated alternatives for effective usage of E-learning systems and among them include models which explain how users accept, use, and evaluate such systems as they use them on daily basis. Due to the low ICT readiness in developing nations like Tanzania, there is a lack of grounds for the inclusion of various factors and dimensions to the conceptual models which in turn results in testing incomplete, intuitive, and ad hoc sets or irrelevant dimensions. This study closes this gap by conducting a systematic documentary review of studies from 2007 to 2020 on E-learning systems to identify the key factors and their associated dimensions. The findings provide foundations that further research on e-learning acceptance in the contexts of developing countries including Tanzania can adopt on formulating hypotheses and generating information on their research contexts.
Бесплатно
Exploring the Impact of Innovation between japanese KIBS and Clients
Статья научная
The purpose of this paper is to propose an analytical framework to explain why knowledge intensive business services (KIBS) have become an important strategy for many firms. It will especially examine why the relationships between KIBS and clients are different by analyzing the impact of KIBS for different types of innovation and different divisions, and also what and how the service delivery method contributes to each type of innovation for Japanese manufacturing corporations (JMCs). The results show that firstly, KIBS provide professional knowledge to accelerate the different innovation of their clients; secondly, KIBS contribute more to the radical innovation of a client than incremental innovation; and the thirdly, face-to-face delivery is the most efficient method of service from KIBS to the JMCs.
Бесплатно
Exploring the high potential factors that affects students’ academic performance
Статья научная
The rapid increase in student population has resulted in expansion of educational facilities at all level. Nowadays, responsibilities of teachers are many. It is the responsibilities of teachers to guide the students to choose their carrier field according to their abilities and aptitudes. The Data Mining field mines the educational data from large volumes of data to improve the quality of educational processes. Today’s need of educational system is to develop the individual to enhance problem solving and decision making skills in addition to build their social skills. Educational Data Mining is one of the applications of Data Mining to find out the hidden patterns and knowledge in Educational Institutions. There are three important groups of students have been identified: Fast Learners, Average Learners, and Slow Learners. In fact, students are probably struggles in many factors. This work focuses on finding the high potential factors that affects the performance of college students. This finding will improve the students’ academic performance positively.
Бесплатно
Face Recognition using Curvelet Transform and (2D)2PCA
Статья научная
This paper proposes a novel algorithm for face recognition, which is based on curvelet transform and (2D)2PCA. Contrast to traditional tools such as wavelet transform, curvelet transform has better directional and edge representation abilities. Inspired by these attractive attributes, we decompose face images to get low frequency coefficients by curvelet transform. (2D)2PCA with an exponential decay factor is applied on these selected coefficients to extract feature vectors, which will achieve dimension reduction as well. The nearest neighbor classifier is adopted for classification. Extensive comparison experiments on different data sets are carried out on ORL and Yale face database. Results prove that the proposed algorithm has high recognition accuracy and short recognition time, and it is also robust to changes in pose, expression and illumination.
Бесплатно
Fast Intra Mode Decision Algorithm Based on Texture Direction Detection for H.264/AVC
Статья научная
The latest video coding standard H.264/AVC outperforms previous standards in terms of coding efficiency at cost of higher runtime complexity. When RDO is used, the most time-consuming process in a H.264/AVC encoder is mode decision, where all the intra/inter modes are tested to find the optimal coding mode. In this paper, we present a fast intra mode decision scheme, which first detects the texture direction and only tests a subset of intra modes consistent with detected direction. Experimental results demonstrate that the proposed scheme significantly reduces the overall encoding time with negligible coding performance loss.
Бесплатно
Feasibility Analysis and Simulation of the Solar Photovoltaic Rooftop System Using PVsyst Software
Статья научная
The objective of the research is to design and evaluate the grid-connected solar photovoltaic roof-top system at Tetulia, Panchagrah, Bangladesh using PVsyst software. The main factors of this research are the move toward renewable energy like PV with environmental consequences. The overall performance of a photovoltaic cell is determined by the amount of solar irradiation, the type of PV module used, and the orientation of PV module. Now, the grid-connected PV system is the best choice for large-scale renewable energy. For the case study, PVsyst software is used to analyze a 3kW solar PV plant installed on a rooftop for residential load consumption of 8.1kWh/day. The available AC energy generated by the PV panels is 4172kWh/year, and 1871kWh/year of surplus energy is supplied to the grid after daytime power demand is met. The yearly global horizontal irradiation of Tetulia, Panchagrah is 1485.4kWh/m2 and during the night, the quantity of electricity imported from the grid is 1050kWh/year. This technology helps in the prediction of power outages and backup energy storage because it makes use of the energy stored in the batteries.
Бесплатно
Flow Analysis of Fresh Vegetable Box Based on Multiporosity Material
Статья научная
Fresh vegetable box is a box including a gas control device, uses of the principle of controlled atmosphere to keep fresh vegetable effect. In the preservation process, the fresh vegetable box can not be so easy to obtain uniform velocity field because the parameters of the box have different effects, and it will affect final preservation effect of fresh vegetable box. In this paper, a fresh vegetable box based on multiporosity material was recommended. 5 different cases were candidated and analyzed for investigating the effect of the property of the multiporosity material. The analysis results show that the property has an important effect to final velocity uniformity. The developed product and method can be used to develop a high performance fresh vegetable box.
Бесплатно
Food Safety Testing Technology Based on The Spectrophotometer and ARM
Статья научная
This paper describes using spectrophotometer and ARM in food safety detection system. Using the spectrophotometer as sensors will convert lead concentration and organophosphate pesticides concentration into optical signals. Data will be analyzed by ARM. This system can also complete photoelectric conversion, A/D conversion functions and complete light signal processing effectively. The hardwares are low prices, cost-effective, stable work, and easy to operate. This testing technology provides a reliable method for food safety detection.
Бесплатно
Forecasting using Artificial Neural Network and Statistics Models
Статья научная
Forecasting is very important for planning and decision-making in all fields to predict the conditions and cases surrounding the problem under study before making any decision. Hence, many forecasting methods have been developed to produce accurate predicted values. Consumer price indices provide appropriate and timely information about prices changes, which affect the economy of all Yemenis because of their different uses in many ways. It can be used as an economic indicator (wider use in the inflation measurement), and as a means of regulating income. It is also used as a supplement for statistical chains to predict future value indices in order to make sure that the data accurately reflect the patterns purchased by the Yemeni consumer. In this paper, we propose a modified artificial neural network method to predict the indices of consumer in the Republic of Yemen to the prices of the period from 01/01/2005 till 01/01/2014. The results of using the proposed method is compared to a classical statistical method. The proposed method is based on artificial neural networks, namely, back propagation with adaptive slope and momentum parameter to update weights. However, the statistical method is Box-Jenkins model which is used to predict time series. The experimental results show that artificial neural networks gives better predictive values due to their ability to deal with the nonlinear and stochastic data better than traditional statistical modeling techniques.
Бесплатно
Forest Area Land Management Information Based on Website
Статья научная
Management of forest area land is a concern for community cultural values, aspirations, and involvement of local forest area communities in managing forest land with the existence of Community Based Forest Management(CBFM). In an effort to make it easier to collect data, currently, the management of forest land management data at Perum Perhutani KPH (KPH is the smallest unit of the forest management system at the site level) Tenggarong, especially in the Community Based Forest Management (CBFM) section, is still done manually by writing in a ledger. With the aim that Perum Perhutani KPH(is the smallest unit of the forest management system at the site level) Tenggarong, especially the Community Based Forest Management (CBFM) section, can use web-based application technology to be able to collect data more efficiently in terms of time and cost and print reports. The methodology of making this research uses the Waterfall methodology which consists of needs analysis, system design, program code writing, system testing, and application implementation and maintenance. The programming language used is PHP with a database using MySQL. This research develop a web-based forest area land management information system, that can facilitate and assist in recording and reporting “Pesanggem” (forest cultivator) data carried out by Community Based Forest Management(CBFM) expert staff at Perum Perhutani KPH (which is the smallest unit of the forest management system at the site level) Tenggarong.
Бесплатно
Framework for Provenance based Virtual Machine Placement in Cloud
Статья научная
Due to the high availability of resources in the Cloud Computing platform, there is a tremendous increase in the underutilization of these resources. Improving the throughput and effectively utilizing these resources are two main challenges in the cloud computing scenario. This paper proposes a methodology for improving the throughput and effective utilization of resources by appropriately placing the Virtual Machine in the server that would be more productive. The proposed solution is based on VM placement algorithm and an exclusive framework is designed for this algorithm. This algorithm refers to the history of data which is available in a global provenance database. By utilizing this provenance data, the system performance is improved.
Бесплатно