Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 613

A self-learning knowledge based system for diagnosis and treatment of chronic kidney disease

A self-learning knowledge based system for diagnosis and treatment of chronic kidney disease

Siraj Mohammed

Статья научная

Chronic kidney disease is an important challenge for health systems around the world and consuming a huge proportion of health care finances. Around 85% of the world populations live in developing country of the world, where chronic kidney disease prevention programs are undeveloped. Treatment options for chronic kidney disease are not readily available for most countries in sub-Saharan Africa including Ethiopia. Many rural and urban communities in Ethiopia have extremely limited access to medical advice where medical experts are not readily available. To address such a problem, a medical knowledge-based system can play a significant role. Therefore, the aim of this research was developing a self- learning knowledge based system for diagnosis and treatment of the first three stages of kidney disease that can update the knowledge without the involvement of knowledge engineer. In the development of this system, the following procedures are followed: Knowledge Engineering research design was used to develop prototype system. Purposive sampling strategies were utilized to choose specialists. The information was acquired by using both structured and unstructured interviews and all knowledge’s are represented by using production rule. The represented production rule was modeled by using decision tree modeling approach. Implementation was employed by using pro-log tools. Testing and evolution was performed through test case and user acceptance methods. Finally, we extensively evaluate the prototype system through visual interactions and test cases. The test results show that our approach is better to the current ones.

Бесплатно

A steady-state analysis of a hair salon as a single-queue, multi-server system to optimize the waiting time in a queue

A steady-state analysis of a hair salon as a single-queue, multi-server system to optimize the waiting time in a queue

Sambhav Kharel, Roshan Bhandari, Satish K. C., Aayush Bhattrai

Статья научная

The waiting lines and service systems are crucial parts of our daily life. Services like hospitals and clinics, banks, salons, restaurants, et cetera have a high influx of people during the working hours. Every system likes to avoid losing their desired customers due to a long wait in the queue. Increasing the number of servers obviously reduces waiting time, but is not the best solution since it adds expenses because the employees should be paid. On the other hand, not concerning about waiting time will result in customer dissatisfaction and ultimately the loss of valued customers. This article presents the analytical study of the overall time that a customer needs to spend on a hair salon for the current number of hairdressers as well as the impact of adding servers (hairdressers) on waiting time. It models the queuing system of the hair salon to optimize the waiting time for a customer who arrives at the salon. Further, it provides a basis to make a wise decision on adding servers. The system is modelled as a steady-state single queue, multi-server configuration system.

Бесплатно

A study on malware and malware detection techniques

A study on malware and malware detection techniques

Rabia Tahir

Статья научная

The impact of malicious software are getting worse day by day. Malicious software or malwares are programs that are created to harm, interrupt or damage computers, networks and other resources associated with it. Malwares are transferred in computers without the knowledge of its owner. Mostly the medium used to spread malwares are networks and portable devices. Malwares are always been a threat to digital world but with a rapid increase in the use of internet, the impacts of the malwares become severe and cannot be ignored. A lot of malware detectors have been created, the effectiveness of these detectors depend upon the techniques being used. Although researchers are developing latest technologies for the timely detection of malwares but still malware creators always stay one step ahead. In this paper, a detailed review of malwares types are provided, malware analysis and detection techniques are studied and compared. Furthermore, malware obfuscation techniques have also been presented.

Бесплатно

A study to Analyze impact of social media on society: WhatsApp in particular

A study to Analyze impact of social media on society: WhatsApp in particular

Monika mangla, Smita Ambarkar, Rakhi Akhare

Статья научная

With an enormous growth in the number of users for social media, it becomes important to understand its impact on the society. This paper is a small step in this direction by analyzing the impact of social media on the emotional health of its users. The paper in particular focuses on the impact of WhatsApp usage. In the study, authors have focused their research on 225 users. In this survey authors found that WhatsApp has a significant impact on the humans these days. It adversely impacts the youth and their education, behavior and routine life. This app is found to be highly addictive, which leaves a trace that becomes difficult to control. The impact of this application is so engrossing that users give up their real world interest and whole emotional quotient is restricted to the app. Their happiness or sadness depends on the reply that they receive from other users. They cannot control themselves from constantly chatting, replying and sharing of ideas. Hence, it is found during the study that some findings are alarming and needs to be controlled. It is noticed during the survey that WhatsApp has greatly influenced the life style of its users and therefore its usage should be monitored and controlled to avoid any adverse effect on emotional health of its users.

Бесплатно

A visual analysis of the research on the use of mobile phones by college students based on VOSviewer

A visual analysis of the research on the use of mobile phones by college students based on VOSviewer

Han Xiyang

Статья научная

The problem of cell phone addiction has severely affected college students' physical and mental health. Using VOSviewer, this paper analyzed 101 articles on college students and mobile phones in the CNKI database (China National Knowledge Infrastructure) from 2003 to 2019. The results showed that: in 2014, the relevant research on college students and mobile phones was relatively hot, with a total of 19 articles published and a total of 429 times cited, and then the number of papers began to reduce. The top 10 institutions with the largest number of documents are all universities. In the distribution of journals and disciplinary fields, higher education and vocational education are the main directions. The analysis of keyword co-occurrence, mobile phone addiction, research on ideological and political education, and new media are still relatively popular. The four categories of mobile phone addiction, ideological and political education, new media, and mobile phone culture, are the core of the current research on mobile phone use by college students through the keyword cluster analysis. The results can not only provide a reference for the research direction and hot spot selection of college students and mobile phone related issues, but also help to explore the influencing factors and prevention of mobile phone use on college students' psychological and physical health.

Бесплатно

ABC Model of Research Productivity and Higher Educational Institutional Ranking

ABC Model of Research Productivity and Higher Educational Institutional Ranking

P. Sreeramana Aithal, Suresh Kumar P. M.

Статья научная

Institutional Ranking has become a common practice in higher educational institutions, and business schools are the most benefitted by such ranking announced worldwide based on various ranking criteria. The ranking is usually based on pedagogy, placement, research output, faculty-student ratio, international linkage, management of technology etc. In this paper, based on six postulates, we have argued and analysed why the performance of higher educational institutions should be based on sole criteria of Institutional Research Performance (IRP). We have developed a model of measuring research productivity for higher educational institutions based on calculating institutional research index and weighted research index. The institutional research productivity is calculated using a metric which consists of three institutional variables and one parameter. The three variables identified are the following: Number of Articles published in peer reviewed journals (A), Number of Books published (B), and Number of Case studies and/or Book Chapters (C) published during a given time of observation. The parameter used is a number of full-time Faculty members (F) which remains constant during a given period of observation. A framework for institutional ranking based on institutional research productivity by considering calculated Institutional Research Index is also developed which can be used to give grades to higher educational institutions. Further, the model is tested by making use of case example of two best Business Schools from the USA and two best Business Schools from India. The value of research index and weighted research index are calculated for these institutions and observed variation of research productivity during last four years is also studied and discussed.

Бесплатно

Abiding IPRs in Technological Implications for Pakistan

Abiding IPRs in Technological Implications for Pakistan

Murtaza Hussain Shaikh, Ievet S.Karlson, Noor Ahmed Ansari, Mahreen Jurial Khan, Dai xiaoling

Статья научная

The focal objective of this article is to analyze the role of intellectual property rights in technological implications within a general context. The performance of the IPRs system and its interaction with national innovation system with some degrees of success has also been highlighted. Major encounter over subsequently decade will be to identify policies and solutions that would permit marketplace economy to flourish in the framework of this intellectual property insurrection. There has been a lot of dispute on the role of intellectual property protection regime specially in fostering innovation, technology development of a country. IPRs are expected to emboli the innovation, by rewarding inventor with a grant of domination rights over the mercantile exploitation for a specified time period. This article tries to attempts to review the role of the IPR regime in technological development and also have suggested some policy implications for country like Pakistan and some reflecting lessons for other developing countries with similar settings and common characteristics.

Бесплатно

About One Approach for Intellectual Analysis of Social Processes

About One Approach for Intellectual Analysis of Social Processes

I.Y. Alakbarova

Статья научная

Modern social processes largely depend on the nature of the forms of change in people's lifestyles under the influence of information technology. Information and communication technologies (ICT) affect not only the biological and social development of people, but also their emotional and psychological state, relationships with others, and worldview. A brief review of research in the field of social informatics and the problems mentioned in the article prove the relevance of creating a system of intellectual analysis of social processes. The purpose of the study is to develop a general model for the analysis of social processes. This article discusses research in the field of social informatics and identifies factors that affect social processes in society. The model of a system for analyzing social processes and social relations is proposed. The article consists of four parts: the first part, which is of a general nature, contains general information about social informatics; the second part examines social groups in society and their characteristics, and the third part is devoted to the classification of social processes. The fourth part proposes a new model for the intellectual analysis of social processes. The proposed modeling model, among other advantages, offers an effective solution to the problem of big data, which is the main problem in the analysis of social processes. The proposed approach can be useful for a correct understanding and forecasting of social processes in society. Since the identification of knowledge and forecasting in social processes is an important factor in social progress and the socio-economic development of society.

Бесплатно

Access to Electricity in Ghanaian Basic Schools and ICT in Education Policy Rhetoric: Empirical Quantitative Analysis and Access Theory Approach

Access to Electricity in Ghanaian Basic Schools and ICT in Education Policy Rhetoric: Empirical Quantitative Analysis and Access Theory Approach

Issah Baako, Prosper Gidisu, Sayibu Umar

Статья научная

The attempt to integrate ICTs into the education system in Ghana has existed close to two decades following the adoption of the ICT for Accelerated Development (ICTAD) policy in 2003. However, empirical quantitative studies to analyse the access of basic schools to electricity, which is the major power of technology devices, over the period appear non-existent. This article is a descriptive quantitative analysis of basic school access to electricity for the academic years 2010 / 2011 to 2017/2018 using secondary data obtained from the Educational Management and Information System (EMIS) through the lens of Access Theory. The study was undertaken using secondary educational statistical data and document reviews as data sources. The results of the data analysis indicate a low electricity access rate in basic schools in the Northern Region of the country. The study concludes that the gap between the ICT in education policy rhetoric and the reality in ICT for education (ICT4E) at the Ghanaian basic school level appears unhealthy and requires stakeholders’ immediate attention to realize the desired impact of ICT in education policy if the goal of the country to achieve the Sustainable Development Goals 4 and 10 need to be success. The findings of these studies provide valuable insights for policymakers and education stakeholders in designing effective policies and interventions to improve access to electricity and promote the integration of ICT in basic education.

Бесплатно

Active Networks: Applications and Security Issues

Active Networks: Applications and Security Issues

Azka

Статья научная

Active networks introduce a new concept to network architecture. Network nodes are capable of executing codes carried by packets which change their state. Active networks provide a flexible networking environment by their programming capabilities. Although active networks have benefitted networking largely, at the same time they pose many security threats due to their complexity. Since active networks have become famous because of programmability but it's increasing flexible nature opens doors to new security risks. Currently research is being conducted to find out the benefits of active networks over the traditional networks and also to cope up with the security risks that active networks pose. The paper focuses on the benefits of active network over the passive network. The objectives and applications of active networks are briefly discussed. The methodologies of deploying active networks are also mentioned. In the latter part the security issues raised by active networks are presented and methods to cope up with them are also briefly discussed.

Бесплатно

Adaptive Dictionary-based Compression of Protein Sequences

Adaptive Dictionary-based Compression of Protein Sequences

Akash Nag, Sunil Karforma

Статья научная

This paper introduces a simple and fast lossless compression algorithm, called CAD, for the compression of protein sequences. The proposed algorithm is specially suited for compressing proteomes, which are the collection of all proteins expressed by an organism. Maintaining a changing dictionary of actively used amino-acid residues, the algorithm uses the adaptive dictionary together with Huffman coding to achieve an average compression rate of 3.25 bits per symbol, better than most other existing protein-compression and general-purpose compression algorithms known to us. With an average compression ratio of 2.46:1 and an average compression rate of 1.32M residues/sec, our algorithm outperforms every other compression algorithm for compressing protein sequences in terms of the balance in compression-time and compression rate.

Бесплатно

Advancing Decision Review System (DRS) in Cricket: Harnessing Ai for Enhanced Decision Making

Advancing Decision Review System (DRS) in Cricket: Harnessing Ai for Enhanced Decision Making

R. Satheeskumar

Статья научная

The Decision Review System (DRS) in cricket has significantly improved decision-making accuracy, but there is immense potential for advancement through the integration of AI techniques. This paper explores the concept of advancing the DRS by harnessing AI capabilities to enhance decision-making in cricket matches. It presents an overview of the current state of the DRS, highlighting its components and limitations. The paper then delves into the possibilities offered by AI, including ball-tracking algorithms, predictive analytics, automated decision-making, and refining technology accuracy. Furthermore, it discusses the challenges associated with data availability, model transparency, and maintaining the integrity of the game. By harnessing AI techniques in the DRS, cricket can benefit from objective and data-driven decision-making, reducing human error and enhancing fairness in the game.

Бесплатно

Advantages and Disadvantages of PowerPoint in Lectures to Science Students

Advantages and Disadvantages of PowerPoint in Lectures to Science Students

Ding Xingeng, Liu Jianxiang

Статья научная

PowerPoint is now widely used in lectures to science students in most colleges of China. We summarize its advantages as producing better visual effects, high efficiency in information transfer, precise and systemic knowledge structure. Disadvantages of PowerPoint may be induced by irrelevant information in slides, neglect of interaction with students, uncontrolled speed in presenting or too strict order of slides. Strategies to avoid these disadvantages are proposed.

Бесплатно

Aggressive action estimation: a comprehensive review on neural network based human segmentation and action recognition

Aggressive action estimation: a comprehensive review on neural network based human segmentation and action recognition

A. F. M. Saifuddin Saif, Md. Akib Shahriar Khan, Abir Mohammad Hadi, Rahul Prashad Karmoker, Joy Julian Gomes

Статья научная

Human action recognition has been a talked topic since machine vision was coined. With the advent of neural networks and deep learning methods, various architectures were suggested to address the problems within a context. Convolutional neural network has been the primary go-to architecture for image segmentation, flow estimation and action recognition in recent days. As the problem itself is an extended version of various sub-problems, such as frame segmentation, spatial and temporal feature extraction, motion modeling and action classification as a whole, some methods reviewed in this paper addressed sub-problems and some tried to address a single architecture to the action recognition problem. While being a success, convolution neural networks have drawbacks in its pooling methods. CapsNet, on the other hand, uses squashing function to determine the activation. Also it addresses spatiotemporal information with the normalized vector maps while CNN-based methods extracts feature map for spatial and temporal information and later augment them in a fusion layer for combining two separate feature maps. Critical review of papers provided in this work can contribute significantly in addressing human action recognition problem as a whole.

Бесплатно

Agile Methodologies in Software Engineering and Web Engineering

Agile Methodologies in Software Engineering and Web Engineering

Arun Kumar Kamepally, Tejaswini Nalamothu

Статья научная

Agile development methodologies have been gaining their importance in the present scenario. The usage of agile methodologies has been increased over the past few years for the development of software applications. It is a new paradigm transdisplanary research area. This paper helps the researcher to get a better understanding of agile methodologies in both software and web engineering: introduction, adoption, usage and analysis of agile in both streams. The rest of the paper summarizes the differences in adopting agile in software engineering and web engineering and also it explains the limitations of using agile in software engineering and web engineering.

Бесплатно

Agricultural Research Resource Sharing Model Based Grids

Agricultural Research Resource Sharing Model Based Grids

Liu Haihui

Статья научная

Grids provide a high-performance computing, resource management and service capacity through the composition of high-speed Internet, fully integrated sharing resources including geographically distributed computing resources such as CPU, memory, databases, etc. There exist duplication in the system, some devices are frequently used, and some devices are long idle, there is ineffective share in China's agricultural scientific research and resources, so the agricultural research and resource sharing platform based on Grid are constructed. making the network's each user can access shared services with other users authorization, can solve "information isolated island" problem which exists in agricultural informationization to a certain extent, effectively use the resources of agricultural research to promote our country's rapid development in agricultural science research.

Бесплатно

An Adaptive Audio Watermarking Scheme Method Based on Kernel Fuzzy C-means Clustering

An Adaptive Audio Watermarking Scheme Method Based on Kernel Fuzzy C-means Clustering

Honghong Chen, Zulin Zhang

Статья научная

In this paper, we propose an adaptive audio watermarking scheme according to local audio features. Firstly, the original audio signal is partitioned into audio frames and these audio frames are transformed into DWT domain respectively. Next, the local features of each audio frame are extracted respectively, and these features are used to train kernel fuzzy c-means (KFCM) clustering algorithm. According to well-trained KFCM, the audio frames to embed the watermark are selected and their embedding strengths are determined adaptively. The experimental results show the proposed method is robust to common signal processing operations such as lossy compression (MP3), filtering, re-sampling, re-quantizing, etc.

Бесплатно

An Assessment of Data Mining Based CRM Techniques for Enhancing Profitability

An Assessment of Data Mining Based CRM Techniques for Enhancing Profitability

Abdur Rahman, M.N.A. Khan

Статья научная

Customer Relationship Management (CRM) system is used to manage company relations with the existing and prospect customers. Data mining is used in organization for decision making and forecasting of prospective customers. We have studied recent literature related to use of data mining techniques for CRM. Based on review of the contemporary literature, we analyzed different data mining techniques employed in different types of business, corporate sectors and organizations. We illustrated a critical review table which provides the problem addressed, proposed techniques, significance, limitations and suggested possible improvements for each proposed techniques review during this study. The critical review of the data mining techniques which are being used for CRM is provided in this paper.

Бесплатно

An Efficient Key Distribution Scheme for Sensor Networks

An Efficient Key Distribution Scheme for Sensor Networks

Mei Weng, Hongshan Qu

Статья научная

Security schemes of pairwise key establishment plays a fundamental role in research on security issue in wireless sensor networks. However, establishing pairwise keys in wireless sensor networks is not a trivial task, particularly due to the resource constraints on sensors. In this paper, we prose an efficient key distribution scheme, in which each sensor node randomly selects two key pools from several different key pools and chooses keys from these key pools. The analysis shows that this proposed scheme can substantially improve the security of existing key predistribution scheme.

Бесплатно

An Efficient Pairwise Key Establishment Scheme for Sensor Networks

An Efficient Pairwise Key Establishment Scheme for Sensor Networks

Xiaole Liu, Wangao Li

Статья научная

Pair key establishment is a fundamental security service in wireless sensor networks (WSNs); it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints, establishing pairwise keys in sensor networks is a challenging problem. Several key management schemes have been proposed in literature to establish pairwise keys between sensor nodes; they either too complicated, or insecure for some common attacks. To address these weakness, we propose an efficient pairwise key management scheme in this paper. In the proposed scheme, the sensor nodes are divided into groups and any compromised sensor node will not disclose the key information in the sensor nodes in same group. The analysis shows that compared with existing approaches, this proposed scheme has better network resilience against node capture attack.

Бесплатно

Журнал