Статьи журнала - International Journal of Education and Management Engineering
Все статьи: 613
Статья научная
Undergraduate Tutorial System in University of Oxford can provide useful enlightenment for undergraduate teaching reform in the agricultural and forestry universities in China. As a new undergraduate training mechanism, we have found serious problems in implementation of Undergraduate Tutorial System, such as the insufficient of tutors, and infirmity of Undergraduate Tutorial System and so on. It is necessary to do some work to perfect Undergraduate Tutorial System. Through the investigation of Undergraduate Tutorial System implementation in College of Economic and Trade of Agricultural University of Hebei, Analysis the problems of the current tutorial system and propose coping measures.
Бесплатно
Research on RFID Application in the Pharmacy Logistics System
Статья научная
The quality and safety of pharmacy, which have become essential for the lives of the residents, directly concerns people’s health and security. The pharmacy logistics is still at the starting stage and exists a lot of problems at present in our country, so it would affect the management and monitoring of the pharmacy quality, bringing the security menace. The first section of this paper analyses the characteristics of radio frequency identification (short for RFID) technology and the pharmacy logistics system. Then RFID technology is introduced into the Pharmacy Logistics System, that is to expound the application of RFID in the pharmacy logistics system; the service level of the pharmacy logistics system would be upgraded, and the supervision of the pharmacy would be strengthened.
Бесплатно
Research on Resource-based and Theme-oriented College English Teaching
Статья научная
Guided by the sociocultural theory and input theory, a research was conducted to probe into resource-based and theme-oriented college English teaching. It discusses the principles of college English language materials selection and how theme-oriented teaching activities enhance meaningful language input and output. The results show that the teaching mode can improve students’ multiple intelligences on a large scale and facilitate the transformation between students’ explicit knowledge and tacit knowledge. Being resource-based and theme-oriented, the mode helps broaden students’ horizon, cultivate their humanistic quality, enhance students’ information quality and boost the effects of language learning.
Бесплатно
Research on Simulation of Neuro-fuzzy Control Strategy of Eddy Current Retarder
Статья научная
A simulation model of eddy current retarder is designed, including 1/4 vehicle model, eddy current retarder model, tire model. Based on the PID and neuro-fuzzy controltechnique, twokinds of control algorithm on constant speed control heavytruckare designed. On the built simulation system, the control algorithm is simulated and test. The results show that the neuro-fuzzy controller can implement high precision and strong robust control effects on control of eddy current retarder system.
Бесплатно
Research on Strategies and Patterns of Research Teaching
Статья научная
In order to improve teaching level, quality and effect, more and more attention has been paid to the tendency of research teaching being one part of teaching reform in higher education. The research teaching model is proposed that opposite to in unidirectional knowledge instruction teaching model primarily, it refers to the teaching system melting study and research as a body. The research teaching model is the research undergraduate college teaching basic teaching model. Starting with the significance and the conduction of research teaching, this paper puts forward and analyzes several patterns of research teaching, discusses the important role of teachers in these patterns and proposes some strategies as well as suggestions.
Бесплатно
Статья научная
Cultivation of students' IT practice and innovation capacities is an important aspect of higher learning institutes' educational reform. As one of important teaching links IT practice teaching plays a key role in training high-quality IT application talents for the modernization construction. The paper starts from strengthening financial major students' IT application capacities and makes a research in construction and reform of IT practice teaching base in higher learning institutes of finance with an emphasis on expounding the reform in construction of experimental teaching environment, practice teaching contents and methods and exploring the main methods and their effects in new talent cultivation models in higher learning financial institutes.
Бесплатно
Research on teaching of Java Exception Handling
Статья научная
Exception handling is an important and difficult part of the Java programming’s teaching and training. The paper points out and discusses the two outstanding problems in details during teachings, that are how can make students master exactly the basic ideas of exception handling and locations need to be handled by exception handling methods in Java programs. Furthermore proposes a kind of teaching process which gradually shows the puzzles during the learning of students starting from the case by combining the heuristic teaching with the practical case of significance, and figures out step by step the solving methods, namely the knowledge points, which have to be learned about exception handling. Visualization and simplification are their advantages, which facilitates the students’ learning and understanding. The teaching practice shows that the good teaching results have been achieved.
Бесплатно
Статья научная
Programming instruction is a difficult point at all times, and many students are fearful of learning programming. Good teaching effect has been obtained if teachers can teach students all knowledge points in syllabus through practical software development process, namely, task-oriented programming instruction.
Бесплатно
Research on the Mode of Computer-Aided Translation Teaching
Статья научная
The paper begins with the concept and ideas of multimedia teaching and computer-aided multimedia teaching, illustrates the principles of optimal integration between computer-aided multimedia teaching and traditional teaching, stresses how to balance the relationship between the learners and the teacher and how to benift from the teaching process, all these have just been shown with the figures and been developed by taking translation teaching as the sample, and the constructivist theory of scaffolding instruction has also been adopted as the theory basis, espeiclly to the the design, the Organization and the implement of the multimedia assisted translation teaching.
Бесплатно
Retrieval of Motion Capture Data Aids Efficient Digital Learning
Статья научная
This study aims to integrate digital technology with the animation production process. By experiencing and learning how body joints move — with digital technology as the learning aid — students can create results similar to motion-captured body movements. This then can be applied to animation design with the hope that it can help the students in their future employment. This paper focuses on digital learning and technology to bring forth body movement production principles and an integrative framework. The study results can offer training to front-end talents of the digital content industry. In addition, the main contribution lies in the research and development of training methods and linking them with digital learning techniques. This can provide directions for the development of upcoming relevant cultural industrial courses. This paper will use human-like character animation —that is comparatively harder to represent in 3D computer animation — as the example. It will also discuss the variations in results achieved by different production processes. At the same time, feasible training directions are provided as references for learning digital technologies.
Бесплатно
Review on: Analysis of an IoT Based Blockchain Technology
Статья научная
Blockchain is the technology which in the last decade has influenced our lifestyles most. Bitcoin is a word used frequently for Blockchain. For example, scalability and protection issues that stands up because of the immoderate numbers of IoT items within the community. The server/client version calls for all devices to be connected and authenticated via the server, which creates a single point of failure. Therefore, shifting the IoT machine into the decentralized course may be the right selection. One of the popular decentralization structures is blockchain. The Blockchain is a powerful technology that decentralizes computation and management methods that may resolve many of IoT troubles, in particular safety.Many Blockchain still confuse Bitcoin, even if it's not equal. Bitcoin is one of several applications are available in Blockchain technology. First of all we present an outline of blockchain architecture and compare a few popular consensus methods in various blockchains. This study also introduced the entire blockchain ecosystem of all the articles we examined and summed up. Furthermore, analyses and consensus models are conducted on many blockchain platforms. Finally, we analyze key issues which are necessary for the future of blockchain technology in these key fields to be broadly available.
Бесплатно
Статья научная
Blackboard platform is currently used for undergraduate education in our college. To investigate its role in physiology learning, we conducted a survey on undergraduate students in nurse major. The results suggested that Blackboard platform is helpful and playing an important role in physiology learning. But compared with other learning manners, e-learning on Blackboard is neither the mostly adopted method of learning, nor the preferred means in reviewing. We conclude that Blackboard is not a substitute of textbook, but Blackboard learning may become an important complement to traditional education in undergraduate students.
Бесплатно
Role of Coronavirus Outbreak on Adoption of Electronic Education in New Bussa, Niger State, Nigeria
Статья научная
This study was carried out in New Bussa, Niger state, Nigeria to test the infallibility of the contention that coronavirus outbreak and suspension of physical educational services that accompanies its outbreak will positively or negatively affect demand for and adoption of electronic education (e-education) by students of various educational institutions in Nigeria. The study adopted an online survey made available via Google form to residents of the study area. Furthermore the online survey was accompanied by personal interview of school administrators and tertiary institution students. The survey questionnaire was made accessible to participants that were encouraged to fill the questionnaire online between 18th of October and 10th of November, 2020. The data retrieved were analysed using descriptive statistics and t-test. It was found that demand for and adoption of e-education through software resources was not significantly affected by coronavirus outbreak (μduring=3.90, μbefore=3.72, p>0.05), while e-education through radio and television broadcast was found to be significantly affected by coronavirus outbreak (μduring=4.83, μbefore=4.53, p<0.05). Level of income (as such, high cost of data) was found to have effect on demand for and adoption of e-education software resources. Furthermore, social media channels and generalised software applications (with reduced or no cost of data) were found to be the most adopted software resources at the expense of proprietary e-education software resources. It is therefore recommended that Nigerian government should find a way to reduce internet access cost to enable effective adoption of electronic education through mobile and website applications.
Бесплатно
Role of Human Aspects on the process of Software Requirement Elicitation
Статья научная
Requirement elicitation process requires collaboration with people of different backgrounds and expertise. Collaboration between diverse teams such as developers, testers, designers, requirement engineers, and stakeholders makes requirement elicitation process highly human dependent. The main goal of this research is to find out the role and importance of “human aspects” such as domain knowledge, motivation, communication skills, gender, age personality, attitude, geographical distribution, emotions, and cultural diversity in requirement elicitation activities. The purpose of this study is to identify the industrial perspectives of key human aspects that will help organizations to carry out RE-related activities more effectively. To fulfill that purpose, we surveyed 165 software practitioners and elicited the industrial perspective through their responses. Practitioner’s data revealed that requirement elicitation activities are highly human-dependent, 90% of practitioners were of the view that the success of requirement engineering activities depends on the individuals engaged in those activities. Software practitioner’s data revealed that domain knowledge (84%), motivation (68%), communication skills (61%), and personality (41%) are the highly important aspect for the individual engaged in requirement engineering activities. Furthermore, the data revealed that the correctness (73%) of identified requirements is a highly important factor in measuring the performance of the person involved in the RE process. Simultaneously, the clarity (78%) and the completeness (75%) of identified requirements are also important. Our results suggest that the individual engaged in the requirement engineering process should have the social and collaborative (89%), enthusiastic (94%), altruistic (kind, generous, trustworthy, and helpful) (67%) qualities to be able to carry out RE activities effectively. Our survey suggests that the practitioners may consider the findings of this research appropriately when forming, managing teams, and conducting software requirement elicitation activities.
Бесплатно
Role of Identity Management Systems in Cloud Computing Privacy
Статья научная
These days cloud computing is a main concern for small and medium enterprises. The major concern for these enterprises is about security and privacy. This paper defines privacy and concept of identity management that may help to increase trust in the cloud environment privacy. Cloud computing brings us on-demand service by reduction of hardware costs, but it also suffers from reduction of security. Enterprises scruple to decide which provider is a proper cloud provider by understanding the different types of IDM. IDMs have a major role in applying privacy in various services in cloud computing. Thus, it is vital to have a vision about accessing resources in a secure manner. This paper focused on the SaaS (Software as a Service) and communication on cloud computing environment.
Бесплатно
Running Google Colaboratory as a server – transferring dynamic data in and out of colabs
Статья научная
Mainly all the hype in the field of Machine Learning and Neural Network has led the students of this century learn and research in this field, and the primary issue faced by lot of students and researchers is the availability of proper infrastructure. The complex algorithms need good quality and quantity of CPU’s and GPU’s. Fortunately Google has an aid for such demand, They named it Google Colaboratory. which they provide free of cost. But has lesser flexibility for the user to pass data required for computational purposes. This paper talk about a way in which researchers may feed/retrieve data dynamically without using the manual upload feature of google colaboratory. This will help the researcher or student to concentrate more on their thesis rather than pay attention on data.
Бесплатно
Save Time for Public Transport Users in a Developing Country
Статья научная
A large number of people of a country uses public transport for their daily commute. Public transport users in a developed country get many facilities which is absent in a developing country like frequent transport, less traffic jam, maintaining time schedule, etc. In most of the developing countries, intercity public transports do not have any time schedule to arrive and leave in a stoppage and as a result, a person cannot manage his time accordingly which leads to waste valuable time. In this paper, we have proposed a system which is simple, cost-effective and will be able to save time for a public transport user that might be wasted due to bad timing. The system includes vehicle tracking system to trace the location of the transport and a website for the graphical view of the transport locations. A website has been developed with some dummy data to illustrate the proposed idea.
Бесплатно
Security Analysis of Government & Financial Websites of Bangladesh
Статья научная
The vision 2021 of Bangladesh had to transform into a digital country, where the digital platform was a significant part of it. To make a digital platform, the Bangladesh government announced plans to build web applications in government, non-government, financial, educational and other sectors. By increasing the number of websites, the security risk is growing because of vulnerable coding practices. If those security risks are not fixed, attackers could exploit these vulnerabilities and perform various malpractices like data breaches, injected spam content, spreading viruses, malicious redirects, Denial-of-service, or even website defacements. This paper focuses on vulnerability assessment on Bangladeshi government and financial websites to show the security posture of these sites. This study scanned and analyzed four types of risk alerts High, Medium, Low and Informational using Acunetix and ZAP tools. In addition, the selected top five vulnerabilities are CJ, MC, CSRF, ID and XSS in terms of single vulnerability-type detected for targeted websites. The report has described representing the security condition of Bangladesh official websites. Also, it provided mitigation techniques for these vulnerabilities to avoid security risk, which is less discussed in this country.
Бесплатно
Security risk analysis in online banking transactions: using diamond bank as a case study
Статья научная
This study is devoted to evaluating the security risk analysis and management in Online Banking transactions using Diamond Bank PLC, Nigeria among other banks. In this paper, a research was carried out in order to evaluate the security risk analysis and management in online banking transactions through the use of the questionnaire to determine the level of risk that customers of financial institutions are likely to encounter. The study indication shows that awareness need to be intensified in terms of risk associated with clients saving password and other transaction details in their devices used in performing an online transaction. Also, the bank should improve on their banking transaction application in order to maintain integrity in view of customer account information.
Бесплатно
Security-aware Mobile Application Development Lifecycle (sMADLC)
Статья научная
With the high mobile phone penetration and subsequent significant usage of mobile phone applications, mobile users have become prime targets of hackers. Secure Software Development (SSD) advocates incorporating security aspects at the initial stages of software development. This study proposes a novel Mobile Application Development Lifecycle by reviewing SSD concepts and incorporating these concepts into MADLC- a mobile-focused software development lifecycle to create a security-aware Mobile Application Development Lifecycle (sMADLC). The proposed development lifecycle, sMADLC, can potentially help mobile application developers create secure software that can withstand hacker aggression and assure mobile application users of the confidentiality, integrity and availability of their data and systems.
Бесплатно