Статьи журнала - International Journal of Education and Management Engineering
Все статьи: 613
Principle of Satellite Navigation Orbit and Positioning
Статья научная
We first have studied the principle of satellite navigation orbit and positioning. Then we have taken GPS and Transit satellite navigation system for example, and have discussed them importantly. We also have introduced GLonass globe satellite navigation system of Russia and Navsat navigation satellite system which studied by ESA.
Бесплатно
Problem Solving, Computer Technology, and Students’ Motivation in Learning Mathematics
Статья
In recent years, more and more attentions are given to developing problem solving skills and using computer technology in the teaching and learning of mathematics. Case studies, independent projects, and examples of applications of mathematics are used more and more frequently in mathematics classes in order to enhance students’ development in mathematical thinking and problem solving skills. Two examples of such studies are presented in this paper.
Бесплатно
Programmatically Convert Printable Document to Flash File on Web-based Instruction Platform
Статья научная
Seeing the existing problems of currently known web-based instruction platform and the benefits of flash file, this paper brings up a solution which combines website module with desktop application module based on command-line utility flashprinter.exe and third-party application software, so as to programmatically convert printable documents to flash files, and then detailedly presents the partial main implementation and some run-time interfaces. In the end, the paper draws a conclusion that this solution is applied to web-based instruction platform.
Бесплатно
Programming as an option for females in undergraduate studies
Статья научная
A gender gap exists in undergraduate studies of different careers related to technology. Previous research investigated differences among gender in Science, Technology, Engineering, and Mathematics (STEM) careers and other investigated what influences females to choose a career in computer science. Therefore, an exploratory study was conducted to examine high school student’s perceptions about a technology career in Puerto Rico. The participants on this study were students in different private and public high schools in Puerto Rico, specifically sophomores, juniors and seniors’ females. A sample (n) of 26 female students answered a questionnaire after attending an introductory programming workshop. All of the participants considered the programming workshop as a good experience and they would be interested in attending, and also recommend other girls to attend, future programming events. Results suggest that the highest influence for them to pursue undergraduate studies on a technology program comes from female teachers, mother, and male teachers.
Бесплатно
Promote Research-learning in Teaching of the Basic Theoretical Courses
Статья научная
It is an inevitable choice for college and universities to foster an innovation talent through guiding students to conduct research-learning. In order to foster a “student-oriented” concept and try to bring up the students’ research capabilities in our whole process of teaching, teachers should improve their own teaching abilities and academic levels, carry out research-teaching actively, and make it align with students’ research-learning. It develops research quality and trains students to form an awareness of research so that teachers can promote research-learning in teaching of the basic theoretical courses. This article describes the effectiveness of pilot projects and pilot cases.
Бесплатно
Proposal of Enhanced FDD Process Model
Статья научная
Feature driven development (FDD) is an agile process model that develops software according to the client features. The FDD consists of five processes, several practices and both are providing benefits to improve the software development. Although the FDD provides lots of benefits, but still endures many flaws. In previous research, there have been made numerous modifications in FDD with different aspects. These modifications could not fix all type of flaws and FDD requires improvements in many aspects. These flaws reduce the agility to deliver increments continuously and make an inverse relationship between quality and agility. Due to this relationship, the FDD does not utilize enough time on making extensive documentation, robust design, client or user involvement, and efficient testing. To overcome these issues, an enhanced feature driven development model is proposed. EFDD introduces best practice of agile manifesto named as behavioral driven development used in FDD. In this way, the focus on delivering increments quickly is achieved without affecting the quality of the software. The proposed model provides maximum agility with continuous delivery according to client features and efficient testing strategy which have asses every feature according to client specified functionality.
Бесплатно
Proposal to Improve Mobility in Service Oriented Architecture
Статья научная
Service Oriented Architecture (SOA) is a standard to implement and design applications. It is a channel of communication between service consumer (SC) and service provider (SP). SP offers a service and SC uses a service. Mobile web service verifier component, of SOA architecture, matches best service that is called. Mobile web service verifier component finds a best match of particular service in SP if it is available by the SP. Therefore, there is a pressing need to develop a component that can create a service if it is not found by mobile web service verifier component. This problem is addressed by proposing a new component for SOA architecture called service upgrade (SU) to increase and improve the service creation speed and satisfy SC and SP needs. The questionnaire is used as a research design to evaluate the proposed solution by providing qualitative data. The results show that the majority of respondents are in favor of the proposed solution. It is anticipated that the proposed solution will cater the industrial problem in hand.
Бесплатно
Proposed risk management model to handle changing requirements
Статья научная
The change in requirements while construction of a software may bring into several risks like over budget and extra schedule. The changes in requirements are considered as a high risk to fail the software projects. A good project manager always incorporates risk management paradigm to manage the risks of changing requirements. This research uses available statistical techniques to estimate the cost of risk management with respect to the changing requirement. In addition, a hybrid cost estimation model is proposed using action strategy model to counteract, mitigate and manage the risks of changing requirements. The proposed model is validated using an industrial case study in Saudi Electricity Company (SEC) to conclude the results. The results are found supportive because the proposed model shows significant improvement to estimate the costs of changing requirements as compared to the existing cost estimation models.
Бесплатно
Protocols for Secure Internet of Things
Статья научная
Internet of Things has become a buzzword. It refers to networking of simplest mundane objects not just for human to machine or human to human interactions but for independent thing to thing interaction as well. Such interconnected or smart environment can do wonders but at the same time poses numerous threats to human lives. The ordinary and less powerful objects from day to day life are holding sensitive and private data from humans and trying to transport that through the insecure world of Internet. This new phase of Internet or Internet of Things (IoT) is yet in its infancy and does not have a security support mechanism of its own. The Internet and World Wide Web deal with interconnection of powerful devices like computers or smart phones and are well supported by standard Internet protocols ensuring optimum security and protection. The lightweight versions of the existing Internet protocols are backing the operations of IoT to a large extent but the security needs are not met completely as of yet. Many research organizations and individual researchers are working to make existing protocols and infrastructure applicable in IoT. This paper highlights the threats posed by uncontrolled proliferation of Internet of things and discusses major protocols that have been or that are being designed to overcome the security issues raised by Internet of things.
Бесплатно
Push Management Platform Based on Wechat Small Program and Cloud Development
Статья научная
On the Wechat platform, the current article push is mainly completed by the Wechat Public Account, but it is not perfect in the aspects of user information collection, user service, data storage and management. With economic development and progress of the times, people seek development in spiritual and cultural aspects. This program "One Thing One Story" uses Wechat Web Developer Tools as the medium and Wechat Small Program and Cloud Development as the platform. The purpose of push management platform is "use at any time". Small program cloud development has a relatively complete cloud background. It does not need to rebuild the server in the development cycle. Through the relevant interface, small program development can be started and time cost can be reduced. Using JavaScript, CSS style, JSON database and other technologies, we can realize user data collection, article push, push classification management, push data storage, user praise collection and other functions. This program is applied to article pushing, cultural dissemination and other aspects. Through the platform of Wechat applet, the dream of "accessible" can be realized.
Бесплатно
Quine-McCluskey: a novel concept for mining the frequency patterns from web data
Статья научная
With the advancement in the web technology it is considered as one of the vast repository of information. However this information is in the hidden form. Various data mining techniques need to be applied for extracting the meaningful information from the web. In this paper the various techniques are discussed that have been used by many researchers for extracting the information and also shown the disadvantages with the existing approaches. The paper put forward a novel concept of mining the association rule from the web data by using Quine-McCluskey algorithm. This algorithm is an optimization technique over the existing algorithm like Apriori, reverse Apriori, k-map. This paper exhibits the working of the Quine- McCluskey algorithm that can extract the frequently accessed web pages with minimum number of candidate sets generation. However the limitation of Quine-McCluskey algorithm is that it cannot find the infrequent patterns.
Бесплатно
Статья научная
The Quran courses application helps to manage and organize the Quran courses in the two holy mosques by displaying details of the Quran courses department, course times, registering possibilities, teachers’ names and the capacity of every course. Furthermre, it allows the user to enroll on available courses depending on their age and gender by creating an account containing their personal information, such as name, age, gender, phone number and email. The goal of this application is to display the courses that are in the two holy mosques and facilitate the enrollment process . The application permits communication between teachers and students, and targets those students who want to enroll in specific courses and the teachers who teach those particular courses. This application will be implemented using the same Android Studio programme that is employed in programming the Android applications and MySQL which manage the database. The Quran courses application utilizes usability testing to test the performance of an application and ensure it is usable and useful. This means that the basics function of the application meet the user’s expectations and requirements in an easy and flexible manner without any breakdowns or technical malfunctions. It also means that any problems that users encounter can be identified and resolved. The overall results of the usability testing indicate that users and teachers are happy to use the Quran courses application. . The expected results of this application are that it will save time and effort for all students.
Бесплатно
Random Pattern Standard Bit Embedding for Minimized Histogram Difference
Статья научная
The rapid development of the transfer of data via internet made it easier to send the correct information and quicker to the destination. Today's massive demand of web applications needs the information to be communicated in a secure manner. The transmission of information in a public communication system isn't secure because of interception and improper manipulation by an eavesdropper. So for this problem, the solution is Steganography, which means the art of hiding information in ways that avert the revealing of hiding messages. Secure video steganography is a difficult task of sending the embedded data to the receiver without being detected. This paper presents a steganographic model which is based on random pattern based sequential bit encoding. The proposed model has been designed to enhance the security level. The video embedding creates the higher level of security for the embedded data. Here the encrypted secret image is embedded into the blocks of a cover video file which is selected using autocorrelation function which measures the similarity between the two images. The embedding is done on the basis of random selection of the pixels in the blocks of cover video. The performance parameters that are used to obtain results are taken in the form of chi-square histogram difference measurements. The proposed model increases the security by using random pattern embedding.
Бесплатно
Real World Tour of Cloud Computing for Family
Статья научная
Cloud Computing offers computing as a service on demand. It doesn't provide services only to business, industries and organization. Apart from the commercial usage cloud can be utilized by individuals for domestic purposes. Such a cloud is known as family cloud. This paper speaks about the cloud services that are useful to collaborate members of a family with themselves and also with their relatives and friends. A brief discussion on various cloud services suitable for families is done. The service providers and website address of the family cloud services are tabulated. This paper also justify that cloud helps families to collaborate on budget, grocery shopping, to-do lists and other schedules.
Бесплатно
Realization of Flip Flops using LabVIEW and MATLAB
Статья научная
Digital electronics is the backbone of current technology, play a pivotal role in the growth of humanity. Digital memory is part of digital electronics consists flip-flops building blocks designed by using logical NAND and NOR gates. Validation of storing information in form of bits can be understood from analysis of working of flip-flops. In the present investigation, VI Model of the different flip flops in LabVIEW has been realized and simulation implementation of flip flops is utilized to analyze the functioning of memory elements. The characteristics table of all kind of flip flop is verified using VI Models. Moreover, different flip-flops are also realized in MATLAB using Simulink. In the phase of digital and internet, this student -centric learning of existing theory of flip-flops can easily understand using simulation environment.
Бесплатно
Reflecting on Network-Course Building of Post Education
Статья научная
As the carrier of network education, the network course has the characteristics of shared resource, unlimited time-space domain, multidirectional interaction, and easy cooperation. It meets the new demand of post education to teacher and student, and is indispensable for the nurture of future post-type and combined military personnel. This paper analyses the problems in current network-course of post education from the point of new demand raised by post education and network course building. The view of points, such as organic integrating between traditional education and network education, farther developing and consummating of network education system, enriching teaching material, paying attention to humanity design in the building of network course, and using the positive function of network teaching in post education, are presented too in this paper.
Бесплатно
Reflection on Project Driven LTO Teaching Method
Статья научная
The traditional project driven teaching method is a popular teaching method of implementation of inquiry-based teaching model. However, students have the differences of the basic knowledge resulting in increasing the difficulty of the implementation of project-driven approach. This calls for revisiting the current project driven teaching process. The proposed teaching method of LTO (Learning, Training, Operating) by extending project-driven approach is presented to resolve the problems of traditional project driven teaching method challenging to teachers at universities. The LTO teaching approach encourages more students to participate in courses and stimulates outstanding students to have more developing room. At the same time, the students are led to closely track the up-to-date technology, inspired to research knowledge in-depth. Eventually, the new values are reflected in the area of engineering education from the closed university education to the open society one and from a single classroom to actual job positions. Finally, a case study are performed to testify the efficiency of the proposed model.
Бесплатно
Regression Test Suite Execution Time Analysis using Statistical Techniques
Статья научная
After applying techniques such as test design generation using combinatorial approach, test case selection, test suite minimization and prioritization, further reduction in execution time of the test suite is possible. This is necessary when there is scarcity of resources and time to execute the test suites. We investigate the statistical techniques which can be employed for analysis and reduction of test execution time further. The approach can help in extrapolating the execution time of test suite when the regression team wants to augment the test suite. The statistical techniques can aid in choosing the best test setup in terms of operating system, tool and Java virtual machine combination for given test setup. Further, these techniques are not the activities that need to be carried out before every execution of the test suite. Once the best combination is chosen the same can be used unless there is change in one of the layers of test setup. The activities mentioned in the paper can be part of test setup planning and maintenance phase.
Бесплатно
Статья научная
Regression test suite study has been research topic for decades. In this paper we investigate the Regression test suite prioritization using residual test coverage algorithm for white box testing and introduce new statistical technique for black box testing. Our contribution in this paper is mainly problem solution to breaking the tie in residual coverage algorithm. Further we introduce new metric which can be used for prioritizing the regression test suite for black box testing. Towards the end part of the paper we get down to implementation details explaining how this can be done in the industrial or research project. The intended readers of this paper are developers and testers in the research field and practitioners of software engineering in the large scale industrial projects.
Бесплатно
Requirement engineering in agile
Статья научная
Agile focuses on delivering small increments of the project quickly. Unlike, in traditional practices, project development is initiated after gathering complete requirements. There are different techniques that are used for requirement engineering in agile. Few techniques includes, Extreme programming, Scrum and Feature-Driven Development. This research discusses the problems faced in requirement engineering in agile. Requirements variability and team size are few such problems faced in agile. A comparison of traditional and agile practices is presented in later sections through survey. The survey was filled by IT professionals in Pakistan and results were analyzed. The results indicate that requirements variability causes main problem in requirement engineering process. In addition, good customer relationships help to gather requirements effectively. Teams working in agile are quite satisfied by the customer as compared to teams implementing traditional practices. Moreover, the ways through which efficiency can be attained in requirement engineering is presented. There are different techniques such as, use cases and prototyping that can be used for requirement engineering for efficient results.
Бесплатно