Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 661

Enlightenment on Chinese Evaluation Standard of Educational Game Software from TEEM's

Enlightenment on Chinese Evaluation Standard of Educational Game Software from TEEM's

Liang Lu, Yang Huansong

Статья научная

The author takes the evaluation standard of educational game software(EGS) made by TEEM as an example and analyzes its dimensionality, content and effectiveness. Then the author stresses the enlightenment on the evaluation standard of Chinese EGS about evaluation organization, evaluation scientificity and evaluation efficacy. The aim of this paper is to offer guidance to those enterprises producing EGS, schools and families purchasing EGS, teachers and students using EGS and promote Chinese evaluation standard to match international standard.

Бесплатно

Enterprise Architecture Design at PT Perkebunan Kaltim Utama Using TOGAF ADM

Enterprise Architecture Design at PT Perkebunan Kaltim Utama Using TOGAF ADM

Agus Ganda Permana, Reza Andrea, Imron, Aulia Khoirunnita

Статья научная

Information systems and information technology have become indispensable in modern business operations, serving as critical tools for enhancing efficiency, streamlining processes, and supporting strategic decision-making. To ensure these technologies effectively meet organizational needs, enterprise architecture design plays a key role in aligning business goals with IT systems. This alignment not only improves operational efficiency but also lays the foundation for long-term organizational success. This study employs The Open Group Architecture Framework (TOGAF), focusing on its Architecture Development Method (ADM), to design an enterprise architecture tailored for PT Perkebunan Kaltim Utama. TOGAF ADM offers a structured, iterative approach to architecture development, encompassing phases from the initial planning stage to the final design and implementation analysis. Each phase is designed to integrate business processes with IT systems, enabling a cohesive and adaptive framework. PT Perkebunan Kaltim Utama, a company specializing in palm oil mill maintenance, faces significant operational challenges due to its reliance on manual processes and lack of integration. These inefficiencies hinder productivity and affect the company’s ability to meet strategic goals. This research systematically identifies the functional and technological requirements for PT Perkebunan Kaltim Utama’s business activities, laying the groundwork for an integrated solution. The proposed architecture design addresses these inefficiencies by providing a comprehensive blueprint for implementing a unified system. This system will not only enhance PT Perkebunan Kaltim Utama’s operational performance but also support its strategic objectives, enabling the company to remain competitive and responsive to industry demands. By integrating TOGAF ADM into its processes, PT Perkebunan Kaltim Utama can ensure a more effective alignment of business and IT, paving the way for sustainable growth and improved decision-making capabilities.

Бесплатно

Enterprise Architecture: A Tool for IS Strategy Formulation

Enterprise Architecture: A Tool for IS Strategy Formulation

Budoor Salem Edhah, Aasim Zafar

Статья научная

Nowadays, many organizations are concerned with how successfully they can formulate an information system (IS) strategy. Have them adopted enterprise architecture, they are concerned of how to activate the business and IS decisions. From a functional perspective, enterprise architecture demonstrates how all information technology elements in an organization, systems, processes and people work together as a whole. Hence, enterprise architecture is an approach of aligning the business area of an organization with the IT area. It has become widely recognized that an enterprise architecture plays a key role in influencing the IS strategy formulation. Strategy formulation in enterprises is a continuous process and it is considered an implicit process that is influenced by a set of factors in which enterprise architecture is a major one. In this paper, we discuss that role that an enterprise architecture plays in influencing the IS strategy formulation.

Бесплатно

Essential and New Maintenance KPIs Explained

Essential and New Maintenance KPIs Explained

Fatima Zohra Berrabah, Chahira Belkacemi, Leila Zemmouchi-Ghomari

Статья научная

Maintenance in any manufacturing organization is critical, given its significant role in ensuring business continuity. Maintenance plays a crucial role and has a significant impact on the results of industrial companies. Therefore, it is essential to manage maintenance, observe, understand, and improve actions by adopting well-chosen performance indicators according to the company's needs. These indicators are known as Maintenance KPIs or Key Performance Indicators, which allow for gathering knowledge and exploring the best means to achieve the organization's goals. Maintenance KPIs are critical to keeping track of the function, monitoring performance, and ensuring fulfillment of business expectations. In addition, KPIs drive reliability growth while guiding decisions to improve maintenance efficiency and performance. A helpful maintenance KPIs help to identify the problems causing the maintenance effect and help to select the right strategy to support or correct the actions that produced the results. They also allow to identify the causes of equipment failures (measure the influence of life cycle factors), direct what maintenance does with its time and resources (measure the efficiency and effectiveness of the maintenance group) and identify if maintenance removes failure causes ( measure the improved reliability and operational risk reduction results of maintenance effort) and help drive the business benefits provided by maintenance (measure the contribution to the business value of maintenance). Essential maintenance KPIs are the most commonly used for maintenance management and are adopted by most industries; among these primary KPIs which are essential for maintenance management, we cite Mean Time Between Failure (MTBF), Mean Time To Repair (MTTR), and Overall Equipment (OEE). Nevertheless, it is crucial to continuously redefine and update KPIs to ensure they are appropriate for the organization's current environment, significantly when the constant market or research methodologies change. Hence, researchers and the industry propose several other maintenance KPIs outside the essential ones used in the industry according to the needs and within the performance improvement framework. These proposed KPIs aim to compensate for the lack of maintenance data, the absence of decision support, and the problems related to specific equipment, also in the context of improving the management strategy, the application of predictive maintenance, and the quality control of a maintenance process or the monitoring of systems reviews. Unfortunately, these indicators are not sufficiently known and are, therefore, not used by the industry. However, we believe that some of them should gain maturity and reach the status of widely used traditional indicators, such as the KPI of obsolescence management in maintenance operations and schedule compliance KPIs that aim to link maintenance planning with production. In addition, although not all proposed KPIs in the literature are generalizable, it has been identified that they can sometimes be specific to problematic situations, equipment categories, and even sectors of industry activity. Therefore, this work aims to inventory the most widely used maintenance KPIs and some of the KPIs proposed by researchers and the industry. In addition, we study the trends and challenges of selecting these KPIs and for what purposes they are used to help their understanding and usability. Indeed, Maintenance managers need to select relevant KPIs aligned with the maintenance strategy and the company objectives.

Бесплатно

Evacuation Simulation of Counter-current Behavior Using Agent Model for Pedestrian Dynamics

Evacuation Simulation of Counter-current Behavior Using Agent Model for Pedestrian Dynamics

Xiaoan Zhao, Yanyan You, Ying Zhang

Статья научная

It is an important issue that all occupants should be able to evacuate to safety from sports stadium under emergency. The behavior of occupants is quite complex, and individual behavior will greatly affect the result of the evacuation. Such as the phenomenon of counter-current behavior, sub-group behavior, following behavior and so on. In this paper, we mainly study the counter-current behavior, and a system simulation model is presented, which based on the agent technology. And in order to study the effect on evacuation, two cases have been studied to analyze the impact of evacuation. Simulation processes and results display that the counter-current behavior will be harmful for the movements of people. Simulation processes and results display that the model is very close to real movements of people.

Бесплатно

Evaluating the Feasibility of a Photovoltaic-Fuel Cell Hybrid Energy System for the Ice Cream Factory in Fukuoka City, Japan: An Economic and Technical Analysis

Evaluating the Feasibility of a Photovoltaic-Fuel Cell Hybrid Energy System for the Ice Cream Factory in Fukuoka City, Japan: An Economic and Technical Analysis

Md. Ahsan Habib, Sumon Kumar Debnath, Md. Shahin Parvej, Jannatun Ferdous, Md. Ali Asgar, Md. Ahasan Habib, Md. Asaduzzaman Jemy

Статья научная

This paper is dedicated to a comprehensive analysis of hybrid energy options, with a specific focus on exploring their economic and environmental advantages within the context of an ice cream factory located in Fukuoka, Japan. The study takes a holistic approach, delving into various facets such as power generation, energy expenses, and related factors to uncover the potential benefits associated with specific configurations of hybrid energy solutions. The analysis presented in this study serves as a valuable tool for assessing the impact of different power generation technologies and energy management strategies. It sheds light on how these choices can influence not only the factory's operational costs but also its environmental footprint. By quantifying these effects, the study provides critical insights that can guide decision-makers toward more sustainable and economically sound energy solutions. As a forward-looking application approach, this research envisions the utilization of a PV-wind-diesel-grid-electrolyzer power system. This hybrid configuration serves as a versatile platform for conducting simulation studies, allowing for the exploration of a wide spectrum of potentially viable solutions. The insights derived from these simulations not only facilitate informed decision-making but also pave the way for anticipating and strategically planning future energy implementations. In essence, this study represents a proactive and data-driven approach to energy optimization, offering the ice cream factory in Fukuoka a roadmap to harnessing the benefits of hybrid energy systems, ultimately contributing to both economic efficiency and environmental sustainability. So, at a cost of energy (COE) of 18.313¥ per kWh, this arrangement stands out as an economically advantageous and environmentally friendly solution for the electrification of the ice cream factory.

Бесплатно

Evaluation Study of Software Quality Management ‎‎(SQM) and Quantitative Process Management ‎‎(QPM) in Pakistan Software Houses

Evaluation Study of Software Quality Management ‎‎(SQM) and Quantitative Process Management ‎‎(QPM) in Pakistan Software Houses

Muhammad Haroon

Статья научная

Key Process Areas (KPAs) for ‎Software Engineering Institute (SEI) Maturity ‎Level 4 can be described in terms of Quantitative ‎Process Management (QPM) which is the metric ‎to control the quantitative performance of a ‎software project. On the other hand, Software ‎Quality Management (SQM) monitors and ‎controls the quality of the project. The survey ‎conducted in this paper covers around 20 ‎software houses of Pakistan. The study revealed ‎that there is weakness in both KPAs, SQM and ‎QPM. Each KPA defines a set of rules that are necessary to be followed to meet the standard but many organizations fail to follow these rules defined in every KPA. If specified and ‎appropriate measures are taken, the software ‎industry will lift it up to the higher CMMI Level.‎

Бесплатно

Evaluation of Data Mining Categorization Algorithms on Aspirates Nucleus Features for Breast Cancer Prediction and Detection

Evaluation of Data Mining Categorization Algorithms on Aspirates Nucleus Features for Breast Cancer Prediction and Detection

Gajendra Sharma

Статья научная

With the development of technology the use of Computer Aided Diagnosis has become a key for breast cancer diagnosis. It is important to increase the accuracy and effective of such systems. The concept of data mining can be applied on the data gathered through such systems for prediction and prevention of breast cancer. In this research, we have conducted the comparison between seven classification algorithms with the help of WEKA (The Waikato Environment for Knowledge Analysis) tool on the 569 instances (10 nucleus attributes) of data with two classes Malignant(M) and Benign (B) of breast cancer aspirate cells. Furthermore the influence of each attribute on prediction was evaluated. The accuracy of these algorithms was above 91% with the highest value of 94.02% for random forest and the predictive power of conclave points was highest whereas lowest was of Fractal Dimension.

Бесплатно

Evaluation of Machine Learning Techniques for Email Spam Classification

Evaluation of Machine Learning Techniques for Email Spam Classification

Mahmoud Jazzar, Rasheed F. Yousef, Derar Eleyan

Статья научная

Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices. Millions of users worldwide use email to exchange data and information between email servers. On the other hand, unwanted emails or spam became phenomenon challenging major companies and organizations due to the volume of spam which is increasing dramatically every year. Spam is annoying and may contain harmful contents. In addition, spam consume computers, servers, and network resources, causes harmful bottleneck, effect on computing memory and speed of digital devices. Moreover, the time consumed by the users to remove unwanted emails is huge. There are many methods developed to filter spam like keyword matching blacklist/whitelist and header information processing. Though, classical methods like blocking the source to prevent the spam are not effective. This study demonstrates and reviews the performance evaluation of the most popular and effective machine learning techniques and algorithms such as Support Vector Machine, ANN, J48, and Naïve Bayes for email spam classification and filtering. In con conclusion, support vector machine performs better than any individual algorithm in term of accuracy. This research contributes on the for the development of methods and techniques for better detection and prevention of spam.

Бесплатно

Evaluation of Voice & Ear Biometrics Authentication System

Evaluation of Voice & Ear Biometrics Authentication System

Safiia Mohammed, Michael Hegarty

Статья научная

The core aim of biometrics authentication methods and technologies is to solve issues and concerns existing in traditional authentication methods like passwords, PIN numbers or identity cards. The Most important concern for business sectors and organizations is to authenticate individuals who interact with them and their services. By considering more than one biometric technology, the authentication process is expected to be more reliable and secure. The Ear and Voice Multimodal Biometrics System is evaluated to compare its performance with ear and voice unimodal systems; the multimodal system takes advantages of the permanence characteristic of ear biometric and voice biometric which is highly acceptable by users. According to the experiment, the ear and voice multimodal system provides better performance than the ear or voice unimodal system. In addition to that, the multimodal system makes a right balance between false rejection and false acceptance rates. This evaluation is intended to contribute to multimodal biometrics research by using behavioral biometric (voice print) and physiological biometric (ear-print) and makes advantage of using both of them in one system.

Бесплатно

Event Stream Processing in BRT Environment

Event Stream Processing in BRT Environment

Wenfeng Liu

Статья научная

Bus Rapid Transit (BRT) system is a kind of Intelligent Transportation System (ITS), which combines wireless communications, computational technologies, floating car data/floating cellular data technologies, inductive loop detection and so on. The GPS (Global Position System) data and the loop detection data are arriving at the BRT dispatch center massively at the same time so the dispatcher can know the real-time status of buses. The passenger flow data are also captured by devices deployed in the stations and then be passed to center too. How to handle those data at low latency and get some events to be used in bus dispatching is really a problem. In this paper, we propose a framework using ESP (event stream processing) technologies that solves the problem more effectively. At last we demonstrate a prototype system implementation that applies in BRT Line 1 project in Beijing.

Бесплатно

Exact Solutions of Kuramoto-Sivashinsky Equation

Exact Solutions of Kuramoto-Sivashinsky Equation

Dahe Feng

Статья научная

Many nonlinear partial differential equations admit traveling wave solutions that move at a constant speed without changing their shapes. It is very important and difficult to search the exact travelling wave solutions.In this work, the auxiliary Riccati equation method and the computer symbolic system Maple are used to study exact solutions for the nonlinear Kuramoto-Sivashinsky equation. Maple can help us solve tedious algebraic calculation. Therefore many exact traveling wave solutions are successfully obtained which include some new kink (or anti-kink) wave solutions and periodic wave solutions.

Бесплатно

Experimental Comparison of Mutation Testing Tools for C Sharp Language

Experimental Comparison of Mutation Testing Tools for C Sharp Language

Tariful Alam, A. G. M. Zaman

Статья научная

Mutation testing is a popular software testing technique, that inject artificial faults into the program and requires test cases to reveal these faults. In this paper, an experimental comparison is analyzed for different types of mutation testing tools in C Sharp language in .NET framework. Different mutation testing tools are giving different mutation score for a program. The objective of this paper is to investigate why the mutation score is different for different tools, and the scope of generating mutants depending on different types of operators. Four tools, such as, Visual Mutator, Cream, Ninja Turtles, and Nester are selected and applied to a program and analyze the outcome. Among these four mutation testing tools, Visual Mutator is better because of its higher mutation score, and it generates mutants for both common and uncommon standard operators and object level operators.

Бесплатно

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

Ritu Choudhary, Mehak Khurana

Статья научная

With the rising importance of the client-side execution scenario, attackers also shifted their focus to the browser based attacks, and compromises based on client devices. Though security experts have come up with various solutions to such attacks but, the attackers at the same time find new ways and technologies to deal with such situations. In this paper, we will discuss about the framework called Metasploit and then we shall define what exactly the Metasploit Framework is and how it can be used in various attack scenarios, this will be followed by a brief description of the terms used including; the exploits, its modules, payloads and meterpreter. Later, the uses of the product will be discussed. The basic purpose of metasploit framework is a module launching, the attacker is able to configure an exploit module and initiate it at a target system. If the exploit succeeds, the payload is executed on the system for which it is targeted and the attacker can interact with the victim machine using the shell created on the host machine. There are number of exploits and payload options available in metasploit framework. It is one of the most useful frameworks as far as the security is concerned. Lastly, we will discuss the method to attack the compromised systems by malicious PDF file using Metasploit Framework. Therefore, the main purpose of this paper is to impart a deep understanding of what Metasploit is and how it can be utilized when one needs to get the access of the local or the remote machine.

Бесплатно

Exploration and Practice for Evaluation of Teaching Methods

Exploration and Practice for Evaluation of Teaching Methods

Xiaodong Wang, Yingjie Wu

Статья научная

This paper discusses one of a series of achievements of teaching reform for the national excellent course "Algorithms and Data Structures". One of the most valuable and most difficult reforms is to strengthen the practical aspects of the curriculum, while strengthening the teacher-student interactive teaching. Another innovation closely related to this teaching reform is a comprehensive scientific evaluation of teaching methods for this complex teaching process. This evaluation method will evaluate the whole process of teaching by a dynamic multi-factor evaluation. It will effectively promote the teaching level continues to increase.

Бесплатно

Exploration and Practice of Graduation Design for Civil Engineering

Exploration and Practice of Graduation Design for Civil Engineering

MA Zhe, HAO Xiao

Статья научная

Aimed at the present situation of the graduation design in Department of Civil and Materials Engineering, Henan University of Urban Construction, the author analyzed the problems in graduate design, focusing on the theme of improving teaching quality, training high quality professionals, from the design layout to adjust the time, conscientiously prepare for early mobilization, rationally choice the design topic to enhance the process of guiding, strengthening teaching stuff, improve the design evaluation system.

Бесплатно

Exploration and Practice of SE-CDIO Educational Pattern

Exploration and Practice of SE-CDIO Educational Pattern

Liu Jian-Bin, Yang Zhi-Yun

Статья научная

Taking the requirement and the education goal of software engineering application talented person as guidance, referring to advanced ideas of the international CDIO higher engineering education, combining realities of software engineering undergraduate educates, this paper presents that innovative SE-CDIO pattern for the cultivation of software engineers is developed and implemented in curriculum system, practice teaching and other respects in the software engineering undergraduate specialty of Beijing Information Science & Technology University. Through designing SE-CDIO application personnel cultivation program for software engineering undergraduates, carrying out educational reform practice positively, we raise diligently the quality of software engineering undergraduates who conforms to the discipline and social development need, at the same time promote discipline and specialized development.

Бесплатно

Exploration and Practice on Reformation Mode of Undergraduate Tutorial System in Faculty of Computer Science

Exploration and Practice on Reformation Mode of Undergraduate Tutorial System in Faculty of Computer Science

Ma Fu, Yang Ping, Wang Xuetong, Cui Ying'an

Статья научная

In view of the difficulty in employment of computer science major, the further exploration of the new cultivating mode to adapt the social development has been the task at the forefront of the colleges and universities. So, supported by the technological means, the implementation of the undergraduate student tutorial system which follows the principle of “the whole participation, contracting by individual, divide- and-rule”, can make the combination of teaching and moral education in the universities come true, and can make the teaching in accordance with the students’ aptitude to meet the goal of individualized cultivation. It also can be beneficial to the successful operation of credit system thus to cultivate more excellent talents.

Бесплатно

Exploration and Practice on the Integrated Training of Supervisory Control System

Exploration and Practice on the Integrated Training of Supervisory Control System

Xiaolin Feng, Haijie Mao, Zhanming Li, Hui Chen

Статья научная

The integrated training of supervisory control system (abbreviated as ITSCS), whose main task focuses on using related domain knowledge flexible, is discussed carefully with the background of teaching practice. A schematic diagram illustrating the relationship between these parts is put forward and explained. Organizing various knowledge comprehensively, integrating SIMATIC SIM platform with training efficiently, applying practice project in society with students’ learning in university as much as possible, are all traits of the training. The present limitations and authors’ own considerations about improving the training continually are also discussed at the end.

Бесплатно

Exploration of various clustering algorithms for text mining

Exploration of various clustering algorithms for text mining

Neha Garg, R.K. Gupta

Статья научная

Due to the current encroachments in technology and also sharp lessening of storage cost, huge extents of documents are being put away in repositories for future references. At the same time, it is time consuming as well as costly to recover the user intrigued documents, out of these gigantic accumulations. Searching of documents can be made more efficient and effective if documents are clustered on the premise of their contents. This article uncovers a comprehensive discussion on various clustering algorithm used in text mining alongside their merits, demerits and comparisons. Further, author has likewise examined the key challenges of clustering algorithms being used for effective clustering of documents.

Бесплатно

Журнал