Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 649

Monkey Pux Data: Visualization and Prediction of the Observed Number of Affected People in Nigeria

Monkey Pux Data: Visualization and Prediction of the Observed Number of Affected People in Nigeria

Okorodudu Franklin Ovuolelolo, Onyeacholem Ifeanyi Joshua, Gracious C. Omede

Статья научная

Information and communication technology (ICT) is the bedrock of information dissemination and a driving force for better economic planning to achieve its goals and get success stored securely and confidentially. Monkeypox (MPX) epidemic outbreaks affect human beings as a whole and can be a cause of serious illness and death. This epidemic continues to challenge medical systems worldwide in many aspects, including sharp increases in demands for hospital beds and critical shortages in medical equipment, while many healthcare workers have themselves been infected. Thus, the capacity for immediate clinical decisions and effective usage of healthcare resources is crucial. Therefore, this research has developed an effective screening system that will enable quick and efficient diagnosis of Monkeypox (MPX) and can mitigate the burden on healthcare systems. This system would be handy in sharing much-needed expert knowledge in the diagnosis of Monkeypox (MPX) symptoms since it would be used by medical officers, clinical officers, and nurses in the absence of specialists. It could be used to collect medical data, which in this case is the symptoms presented by the patients; it can also be useful in training general practitioners, physicians, inexperienced nurses, and paramedics to guarantee suitable and accurate decision-making in the diagnosis and management of Monkeypox (MPX). The methodology adopted is the machine learning algorithms foranalysis and training of our dataset, to ascertain the level at which this epidemic has caused harm to lives, a linear relationship between an independent and dependent variable is provided by the linear regression technique, and Python programming was used to visualize and predict clinical outcomes.

Бесплатно

Multilevel Authentication based Data Security and Verification over Cloud Computing Environment

Multilevel Authentication based Data Security and Verification over Cloud Computing Environment

Deepak Soni, Nishchol Mishra

Статья научная

There are various algorithm proposed in the area of cloud computing environment. Now a days the cloud computing is the very interesting area for research purpose. Cloud computing environment provides the security of user data and integrity verification with the users data, also cloud provide on demand network access to a shared pool of configurable computing resources like network, servers, storage, applications and services that can be rapidly provisioned and provide with minimum user effort and service provider interaction. Uses of cloud computing services is very easy and also in very low cost. The cloud computing services are on demand over the internet, so it provides the facility to clients that access these services remotely from anywhere, anytime with the help of internet and any devices like pc, laptop mobiles etc. The data or information of cloud user is save in cloud service provider so in the cloud computing environment the security of data and privacy of data is primary issue[1]. In this paper a security model is proposed here we provide a mechanism to cloud user to encrypt their data or sensitive information and generate a integrity verification key then save the data on cloud in encrypted form. The cloud user have many choices like private phase, public phase and hybrid phase and the hybrid phase tier1 and tier 2. In all three sections there are various encryption techniques are implemented like AES (Advanced Encryption Scheme)[9], IDEA, Blowfish[12], And SAES based on the security factors namely authentication, confidentiality, security, privacy, non-repudiation and integrity. In Private phase a Unique token generation mechanism with the help of SHA-2 implemented it helps to ensure the authenticity of the user, The Hybrid section of the model provides On Demand Security Choices Tier one or Tier two and Public section provides faster execution with the help of Blowfish algorithm. Overall the user data Is wrapped in two folds of encryption and integrity verification in all sections.

Бесплатно

Multimedia Pedagogy among Literature Lecturers in Two Universities in Uganda post COVID-19

Multimedia Pedagogy among Literature Lecturers in Two Universities in Uganda post COVID-19

Shira N. Tendo

Статья научная

Multimedia pedagogy embodies the use of text materials, photography and other still images, audio files, video presentations and forms of animation, which are all excellent vehicles for Literature teaching. Prior to COVID-19, most lecturers in the selected universities had used multimedia to watch literature films but not to conduct entire lectures. After that pandemic, when schools reopened, the ODEL (Online Distance Education Learning) department's pleas to lecturers to continue with some online courses fell on deaf ears. This study undertook ethnographic research to establish the reasons for the apparent reluctance by both lecturers and students to interface using multimedia during creative writing classes. The observations and interview findings revealed that subject specifications and psychological factors influenced the lecturer and student more than the economic factors against the use of multimedia during lectures. The study recommended retooling teacher trainers in multimedia pedagogy because a person cannot effectively conduct online lectures unless taught how to. The study concluded that human beings are social beings drawn to learning using methods that involve close interaction between the teacher and the taught, and the elaborateness of literature with its genres consists of the teaching of intangible interactions between words and listener, demand for physical interface between teacher and teacher trainee to chisel and polish the genre specifications.

Бесплатно

NGO Support Software Solution: for effective reachability

NGO Support Software Solution: for effective reachability

Janhavi Desale, Kunal Gautama, Saish Khandare, Vedant Parikh , Dhanashree Toradmalle

Статья научная

In India there are currently a lot of NGOs working for noble causes. Citizens are also eager to contribute. Unfortunately for a lot of these NGOs there is a shortage or absence of IT infrastructure, hindering their reach and effectiveness. We aim to aid such NGOs and provide them with the necessary IT infrastructure to optimize use of resources and increase their reach for food and money donations. The project includes a cross platform mobile application which will help them manage their volunteers, get orders by spreading awareness through a social media module to connect to people who wish to support them in this noble cause. There are many freelancing developers and existing apps, the goal is to extract all the best features, figure out best platforms, harness latest trends and develop the app at a cost that the NGO can afford. Our literature survey of existing app gave insights about designing the necessary modules that we must have. To have the analysis of people’s attitude, habits and trends, studying papers related to social media trends inspired us to harness its power. The study of other kinds of systems using mobile applications, encouraged us to consider options of 100% cost free background, enabling us to generate an economical solution.

Бесплатно

Need for anaphoric resolution towards sentiment analysis-a case study with scarlet pimpernel (Novel)

Need for anaphoric resolution towards sentiment analysis-a case study with scarlet pimpernel (Novel)

R.Nithya

Статья научная

The problem of resolving references to earlier or later items in the discourse is commonly called as anaphora resolution or pronoun resolution. These items are usually noun phrases representing objects in the real world called referents but can also be verb phrases, whole sentences or paragraphs. Nowadays, anaphora resolution is addressed in numerous NLP (Natural Language Processing) applications. Proper treatment of anaphoric relations improves the performance of applications. Machine translation, information extraction, text summarization, or dialogue systems are some of the common applications of NLP. In early days, the machine translation systems processed on the basis of a sentence-by-sentence level. It did not consider the ties between sentences and resulted in an incoherent text as output. When the researcher forgets to handle the anaphora issue, it results in the striking problem of incorrect facts. It is very much needed to concentrate on the usage of pronoun, as it should match with their antecedents both in number and gender. Assigning inappropriate morphological features to the anaphor often may also lead to an undesirable change in the meaning of the sentence.

Бесплатно

News Impact on Stock Trend

News Impact on Stock Trend

Protim Dey, Nadia Nahar, B. M. Mainul Hossain

Статья научная

Stock market trend can be predicted with the help of machine learning techniques. However, the stock market changes is uncertain. So it is very difficult and challenging to forecast stock price trend. The main goal of this paper is to implement a model for stock value trend prediction using share market news by machine learning techniques. Although this kind of work is implemented for the stock markets of various developed countries, it is not so common to observe such kind of analysis for the stock markets of underdeveloped countries. The model for this work is built on published stock data obtained from DSE (Dhaka Stock Exchange, Bangladesh), a representative stock market of an underdeveloped country. The empirical result reveals the effectiveness of Convolutional Neural Networks with LSTM model.

Бесплатно

Numerical Images Acquisition and Transmission Based on Microcontroller and CPLD

Numerical Images Acquisition and Transmission Based on Microcontroller and CPLD

Minjin XIAO

Статья научная

This paper presents a digital image acquisition and transmission methods. Using CMOS image sensors, under the control of the CPLD and microcontroller with a USB module, the system realizes the digital image acquisition and transmission. The design principle and system implementation are discussed in this paper. The system has high integration, small size and easy to install and portable .It can be well integrated with pre-processed data and image processing module , this will improve the efficiency of the computers operation. For digital image acquisition applications, size and power consumption are key considerations for hardware and software design problems, the CMOS image sensors used in digital image will have broad prospects.

Бесплатно

Object Motion Direction Detection and Tracking for Automatic Video Surveillance

Object Motion Direction Detection and Tracking for Automatic Video Surveillance

Adithya Urs, Nagaraju C.

Статья научная

In today’s world having a smart reliable surveillance system is very much in need. In fact in many public places like banks, jewellery stores, malls, schools and colleges it is basic necessary to have a surveillance system (CCTV). Most of today’s implementations are not smart and they record videos during night even when there is no motion. This will lead to unnecessary storage usage and difficult to get the important part of the footage. And also, most of the today’s implementations are stationary, they can’t track the moving object. This report will outline a naive approach to implement a smart video surveillance system using object motion detection and tracking. Here we are using conventional Background subtraction model to detect motion and we estimate the direction of motion of object by comparing the centroid of the moving object in subsequent frames and track the moving object by rotating the camera using servo. Video recording takes place only when there is movement in the frame which helps in storage efficiency. We are also improving the speed of email alert delivery by using multithreading.

Бесплатно

On Basic Principles in Contrastive Analysis

On Basic Principles in Contrastive Analysis

Li-juan Wei, Cong-ying Liu

Статья научная

This paper describes some basic concepts in contrastive linguistics, and discusses its function in language teaching. And it compares the English proverbs containing the animal word horse with the equivalent Chinese proverbs. It aims to find the correspondence of the animal word horse in English and Chinese languages and illustrate the cultural phenomenon behind the translation. This paper finds out that the correspondence is very important and can help to understand the languages and the cultures and contribute to the teaching of language. Relevant study should be based on the cooperation and effort of both linguistics and teachers.

Бесплатно

On RFID Application In the Information System of Rail Logistics Center

On RFID Application In the Information System of Rail Logistics Center

Gan Weihua, Zhang Tingting, Zhu Yuwei

Статья научная

Storage and Transportation Base of the railway system has comprehensive advantages in network, specialty and linkage. Thus, the Ministry of Railways plans to rebuild 18 logistic central stations in succession from 2007. They not only perform a core function of regional railway container transport organization, but also connect organically with other means of transportations a regional logistics center. Otherwise, the internet of things in our country is about to enter the application stage of innovation. In order to keep abreast of the times, we should consider the application of RFID in the management system while constructing rail logistics center on the high starting point and high standard. This paper will firstly state the correlative knowledge about rail logistics center and RFID technology, and in detail analyze the design of rail logistics center management information system base on RFID. Its object is to accomplish the information processing automatically and efficiently, and pointed out the construction of management information system on rail logistics center.

Бесплатно

On the Theoretical Framework of Autonomous Learning

On the Theoretical Framework of Autonomous Learning

An Qi

Статья научная

The present research presents an overview of the definitions of two basic concepts in autonomous learning: learner autonomy, teacher autonomy. Based on these definitions, taking the Chinese context into consideration, this research attempts to redefine these concepts respectively. The present research is mainly concerned with the relevant theoretical framework of learner autonomy, namely cognitive learning theories, humanistic psychology, and constructivist theories of learning, and holds that developing learners‟ autonomous learning ability is very necessary to foreign language teaching reform in China. Several enlightenments are made in the end.

Бесплатно

Online Framework of Examination for Evaluating Learner’s Knowledge

Online Framework of Examination for Evaluating Learner’s Knowledge

Bidyut Das, Rupa Debnath, Debnarayan Khatua

Статья научная

The COVID-19 pandemic has necessitated a shift to online assessments, posing significant challenges for teachers in fairly evaluating student performance. The absence of invigilation has led to widespread cheating, with students copying answers from the Internet or top-ranked peers. This paper addresses these issues by proposing guidelines and techniques for fair student assessment without invigilation. The research begins with an analysis of traditional assessment methods and their limitations in the context of unmonitored online exams. It then explores various online examination frameworks, including multiple-choice questions, short-answer questions, and interactive simulations. The study identifies key weaknesses in current online assessment practices and highlights the potential of advanced online examination frameworks. By implementing the suggested techniques, educators can improve the reliability and fairness of online assessments, ensuring a more accurate evaluation of students' knowledge. This article serves as a valuable resource for educators, instructional designers, and e-learning professionals seeking to enhance the efficacy of online assessments.

Бесплатно

Ontology Engineering and Development Aspects: A Survey

Ontology Engineering and Development Aspects: A Survey

Usha Yadav, Gagandeep Singh Narula, Neelam Duhan, Vishal Jain

Статья научная

Ontology can be defined as hierarchical representation of classes, sub classes, their properties and instances. It has led to understanding the concepts of given domain, deriving relationships and representing them in machine interpretable language. Ontologies are associated with different languages that are used in mapping of multiple ontologies. Several applications of ontologies have led towards realization of semantic web. The current web (2.0) is approaching towards semantic web (3.0) that performs intelligent search and stores results in distributed databases. The paper makes readers aware of various aspects of ontology like types of ontology, ontology development life cycle phases, activities involved in ontology development and ontology engineering tools. Ontology engineering contributes to meaningful search and provides with open source tools for deploying and building ontologies.

Бесплатно

Ontology Mapping of Design Process Knowledge Based on Classification

Ontology Mapping of Design Process Knowledge Based on Classification

Xin Shi, Shurong Tong, Bo Li

Статья научная

For the requirements of knowledge reuse in product design process, according to the characteristics of the knowledge representation methods, this paper uses ontology knowledge representation method to construct the product design process knowledge model and gives ontology mapping decision strategy which is based on classification. In the basis of choosing "design department" ontology in human resource management as the heterogeneous ontology of "design organization" ontology in product design process management, lists their concepts set and calculates the similarity of matching concept pairs, finally, outputs the mapping relationship table.

Бесплатно

Opinion Mining of Online Product Reviews from Traditional LDA Topic Clusters using Feature Ontology Tree and Sentiwordnet

Opinion Mining of Online Product Reviews from Traditional LDA Topic Clusters using Feature Ontology Tree and Sentiwordnet

D. Teja Santosh, K. Sudheer Babu, S.D.V. Prasad, A. Vivekananda

Статья научная

Online product reviews provide data about the user's perspective on the features that were experienced by them. Product features and corresponding opinions form a major part in analyzing the online product reviews. Extracting features from a huge number of reviews is classified into three major categories such as utilizing language rules, sequence labeling as well as the topic modeling. Latent Dirichlet Allocation (LDA) is one such topic model which clusters the document words into unsupervised learned topics using Dirichlet priors. The words so clustered are the features and opinion words in the product reviews domain. To identify appropriate product features from these clusters a hierarchical, domain independent Feature Ontology Tree (FOT) is applied to LDA clusters. The opinion bearing words of obtained product features are identified by utilizing the document indicators available from topic matrix of LDA. These indicators are useful to backtrack to the corresponding online review in which the product feature is present. The polarity of the opinion bearing word is calculated with the help of SentiWordNet. This improves the accuracy of the features using extracted LDA topic clusters and machine interpretation of polarity of opinion word is satisfactory.

Бесплатно

Optimal and Appropriate Job Allocation Algorithm for Skilled Agents under a Server Constraint

Optimal and Appropriate Job Allocation Algorithm for Skilled Agents under a Server Constraint

Mijanur Rahaman, Md. Masudul Islam

Статья научная

In a combinatorial auction, there has a server, some agents, and some jobs which can be used to reach efficient resource and job allocations among the agents. In our paper, we have shown how any server can achieve maximum throughput as well as maximum profit based on some server constraints where each agent has one or more skills to perform those jobs on a priority basis which can be executed in a whole or partial. This algorithm can effectively distribute the appropriate job allocation among skilled agents with proper acknowledgment to the server after a certain period.

Бесплатно

Optimization of Curriculum Content Using Data Mining Methods

Optimization of Curriculum Content Using Data Mining Methods

Firudin T. Aghayev, Gulara A. Mammadova, Rena T. Malikova, Lala A. Zeynalova

Статья научная

The purpose of this article is to search and extract the necessary content, identifying curriculum topics. Classification and clustering of text documents are challenging artificial intelligence tasks. Therefore, an important objective of this study is to propose and implement a tool for analyzing textual information. The study used Data Mining methods to analyze text data and generate educational content. The work used methods for classifying text information, namely, support vector machines (SVM), Naive Bayes classifier, decision tree, K-nearest neighbor (kNN) classifier. These methods were used in developing the curriculum for the specialty “Cybersecurity” for the Faculty of Information and Telecommunication Technologies. About 48 curricula in this specialty were analyzed, topics and sections in disciplines were identified, and the content of the academic program was improved. It is expected that the results obtained can be used by specialists, managers and teachers to improve educational activities.

Бесплатно

Optimizing Student Performance Prediction via K-Means and k-NN Integration

Optimizing Student Performance Prediction via K-Means and k-NN Integration

Muh. Nurtanzis Sutoyo, Alders Paliling

Статья научная

This study explores the integration of two methods, namely K-Means and k-NN. K-means is used to identify categories of learning outcome data, while k-NN is used to predict students' learning outcomes into relevant categories. Through the calculation of the Elbow method, it was established that the optimal number of clusters for grouping is three. The learning outcome data, which include Arithmetic and Statistics scores, are processed to produce a mapping that differentiates students into three categories: Adequate, Moderate, and Good. In the 12th iteration, the clustering results using K-Means achieved convergence, with 64 students in the Adequate category (C1), 60 students in the Moderate category (C2), and 59 students in the Good category (C3). This indicates that the students in each group are evenly distributed based on their mathematical and statistical abilities. The prediction results using k-NN for a student with an Arithmetic score of 85 a Statistics score of 75, and a k-value of 61, found that 7 data fell into Category 1 (Adequate), 3 data into Category 2 (Moderate), and dominant 51 data in Category 3 (Good). Thus, the prediction results are placed in Category 3, indicating a 'Good' rating in their academic performance. By using data mining techniques to enhance understanding of student learning outcomes, this study provides a significant contribution to the field of education. It demonstrates substantial progress toward a data-driven learning approach that can be tailored to specific needs and improve student learning outcomes.

Бесплатно

Orphan Adoption Management System using Machine Learning Approach

Orphan Adoption Management System using Machine Learning Approach

R. Kaladevi, Jeevitha B., Jeevitha V., Madhumitha P., Shanmugasundaram Hariharan, Andraju Bhanu Prasad

Статья научная

According to UNICEF, the latest estimate states that there are about 2.7 million children in orphanages. Orphanage is a residence for people who are without parental support or any moral support from anyone. Such orphans require help from people who are in a good financial state to donate them. Generally, in orphanage records are usually maintained for future reference, retrieval, and easy management. The objective of this paper is to help the orphans from different orphanages to get help from the donors who wish to donate them by using our web application. The proposed system helps the staff in reducing manual paper work and enhances tidiness in record keeping since the existing one uses manual keeping, i.e., the use of files and papers. The system allows the orphanage owner to add and modify the orphan records. The system provides suggestions for assignment of these orphans to the caretakers/donors by using SVM (Support Vector Machine) algorithm. Donor can select the orphan and request for adoption from the orphanage owner. The Orphanage owner can accept or reject help from the donor. The proposed system is aimed to facilitate donors with the details of an orphan and providing fund specifically to that orphan.

Бесплатно

Performance Analysis for Heterogeneous & Reconfigurable Computing Based on Scheduling

Performance Analysis for Heterogeneous & Reconfigurable Computing Based on Scheduling

Yiming Tan, Guosun Zeng, Shuixia Hao

Статья научная

Right now, heterogeneous & reconfigurable computing is a research hot in the area of high performance computing. Due to the heterogeneity of application tasks and reconfigurability of system architecture, performance analysis for heterogeneous & reconfigurable computing becomes rather difficult. Unfortunately, the existing techniques and methods are no longer suitable for use. This paper presents a performance analysis method based on task scheduling. It builds on system architecture model and task model of heterogeneous & reconfigurable computing. By making use of heterogeneity matching matrix and reconfigurability coupling matrix we achieve optimal selection and matching between computational tasks and processing units. Through task scheduling algorithm, the completion time of application task run on heterogeneous & reconfigurable computing system can be calculated. Finally, we carry out case study.

Бесплатно

Журнал