Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 613

Automatic Estimation of Emotional Parameters for An Intelligent Avatar

Automatic Estimation of Emotional Parameters for An Intelligent Avatar

Jing Yuan, Baochen Jiang, Menghan Sun

Статья научная

This paper analyzes automatic estimating of emotional parameters from 2D photos based on the MPEG-4 rules. Each affective face image which obtained from a novel picture questionnaire is divided into three parts. The deformation function which calculates the displacements of vertices meshes within the influence of facial animation parameters are discussed. This paper develops geometric and morphological image processing methodologies to lifelike facial expression synthesis. Finally a 3D audio-visual avatar is created which gives the same expression corresponding to the input image. Experimental results are given to support our point of view. The experimental results show that our system properly applied in describing emotional facial expression.

Бесплатно

Automatic Spontaneous Speech Recognition for Punjabi Language Interview Speech Corpus

Automatic Spontaneous Speech Recognition for Punjabi Language Interview Speech Corpus

Yogesh Kumar, Navdeep Singh

Статья научная

Automatic Speech Recognition presents natural phenomena for the communication among man and machine. The purpose of Speech Recognition speech system is to convert the sequence of sound units in the form of text description. The main objective of the research work is to develop the automatic spontaneous speech model for the Punjabi language. Punjabi is categorized as a constituent of the Indo-Aryan subgroup of the Indo-European family of languages. So far no work has been done in the field of spontaneous Punjabi speech recognition system. In spontaneous speech system, the sounds are usually unprompted and non- designed and are commonly described by repetitions, repairs, false start, partial words and non-planned words, silence gap etc. In this paper, the focus is on the development of the spontaneous speech model for the recognition of the Punjabi language. The GUI for Punjabi speech model also has been created and tested for the live Punjabi interview speech corpus. The recognition accuracy is 98.6% for Punjabi sentences and 98.8% for Punjabi words. The sphinx toolkit and java programming are used to build a spontaneous speech model for Punjabi live speech.

Бесплатно

Bangla News Headline Categorization

Bangla News Headline Categorization

Amran Hossain, Niraj Chaudhary, Zahid Hasan Rifad, B. M. Mainul Hossain

Статья научная

News categorization from various newspapers is important as readers want to read the news by category. But, the readers face difficulty if the news from different categories is presented without any order. This study aims to determine the category of news from online Bangla newspapers. In this context Bangla news headlines data, along with its categories, were collected from various online newspapers through scrapping. Eight categories of news are considered for this work and the headlines of the news are used for categorization. The input data is modeled by the LSTM and GRU neural networks, and the predicted category is compared with the actual category. For LSTM model, the result gives an accuracy of 82.74% and GRU model, The result gives an accuracy of 87.48%. GRU accuracy is higher than LSTM. Because, GRU training performance is faster than that of LSTM. In GRU 64 units used and in LSTM 128 units used for this research. For this reason, it also suggests that the GRU model gives better results than that of LSTM.

Бесплатно

Based on DSP Builder of 2PSK Digital Modem Design

Based on DSP Builder of 2PSK Digital Modem Design

Hongyang Zhao

Статья научная

Through analysis on principles of Binary Phase Shift Keying(2PSK) modulation and demodulation, the design scheme based on DSP Builder of DDS (Direct Digital frquency Synthesizer) is put forward. By using DSP Builder complete modulation and demodulation model, carrier signal was generated by DDS signal source. The circuit hardware structure of this design is simple and easy to implement. The modularized design is rapid and efficient. Its relevent parameters can be adjusted flexibly. The desired effect can be achieved by simulation.

Бесплатно

Based on Network moral Education for Teenagers Path Choices of Dual Influence

Based on Network moral Education for Teenagers Path Choices of Dual Influence

Liu Ping-Xiu

Статья научная

Network not only can bring the great convenience for the young people to widen the vision or to get the knowledge, but also can lead to the great wave of mind and moral. Here we analyze the dual influence of network for the teenagers’ ideological and moral, and also raise the route choices of moral education for the network, such as: shifting the moral ideas, enhancing the control of Green-Network Home, improving the adolescents’ personality and prompting the teenagers back to real world.

Бесплатно

Based on The Research and Application of Tengen Software in Architectural Design Teaching Process

Based on The Research and Application of Tengen Software in Architectural Design Teaching Process

TANG Hong, FAN Guo-ling

Статья научная

With the continuous development of high technology, architectural design is on the way to paperless digital era. In order to help students grasp and skillfully apply the architectural computer aided design software and cultivate talented architects with the times, this article is going to bring the Tangent software into architectural teaching. On the basis of graphic and elevation design, section design, three-dimensional modeling and so on in architecture, It expounded the early program draft and the control of late deepening program in view of Tangent software, pointing out the interaction between design software and architectural program so as to make students really understand the function of Tangent software and then improve the students' comprehensive skills.

Бесплатно

Behavioral Changes of Children Intelligence for the Extreme Affection of Parents

Behavioral Changes of Children Intelligence for the Extreme Affection of Parents

Prodipto Bishnu Angon, Sujit Mondal, Chandona Rani Das, Mintu Kumar Bishnu

Статья научная

A nation's most valuable resource is its children. In the future, a nation will be controlled in the same way that a kid will develop. The majority of parent’s lack expertise about how to help their children develop a positive outlook. We concluded in our study by analyzing the association between parental excessive affection and the development of children's intelligence. Through the use of a questionnaire, information was gathered from 531 families. Whereas 43 percent of parents show excessive affection to their children, while 45 percent lavish proper affection. On the other hand, in our study, 48 percent of the children had an IQ score of less than 49. We have identified the alterations in their child's brain as a result of their parents' blind affection and have also identified remedies to the problem. We analyzed it so that the growth of children's intelligence is not hampered by their parents' excessive affection and that the parents and children enjoy a close relationship with their parents.

Бесплатно

Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle

Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle

Ratun Rahman, Md. Rafid Islam

Статья научная

In the past few years, the number of IoT devices has grown substantially, and this trend is likely to continue. An increasing amount of effort is being put into developing software for the ever-increasing IoT devices. Every IoT system at its core has software that enables the devices to function efficiently. But security has always been a concern in this age of information and technology. Security for IoT devices is now a top priority due to the growing number of threats. This study introduces best practices for ensuring security in the IoT, with an emphasis on guidelines to be utilized in software development for IoT devices. The objective of the study is to raise awareness of the potential threats and emphasize the use of secure software development lifecycle. The study will also serve as a point of reference for future developments and provide a solid foundation for securing IoT software and dealing with vulnerabilities. This paper divides the most common concerns with Internet of Things (IoT) security into three primary categories, and then further subdivides each of those categories into other subcategories.

Бесплатно

Best approach to teach advanced programming

Best approach to teach advanced programming

Soly Mathew Biju

Статья научная

This paper focuses on an approach that could be effective for teaching programming languages such as advanced Java Programming, and involves a new framework implemented using the practical approach along with new framework. Assessment tools were designed to facilitate this kind of approach toward teaching programming. The new approach is implemented by conducting lectures in the lab or laptop facilitated classroom. The subject assessments and delivery methods were modified to include projects and class works. Students were encouraged to apply concepts learnt in the class in an incremental manner leading to a complete software application and also write a reflective report. It adapted the Kolb’s experimental learning style theory. Effectiveness of this approach is evident through a comparison of students’ results obtained after implementation of this approach, with results obtained using the traditional style of teaching.

Бесплатно

Big Data Challenges in Biometric Technology

Big Data Challenges in Biometric Technology

Shafagat Mahmudova

Статья научная

This study is devoted to Big Data problems in biometric technologies. It highlights the importance of the use of Big Data technologies in solution of a wide range of issues facing the national security, law enforcement system and defense authorities. The study provides information about Big Data and advanced cloud technologies in the field of biometric technology.

Бесплатно

Bilingual Teaching on Advanced Mathematics

Bilingual Teaching on Advanced Mathematics

Wang Rui, Wang Yawei, Liang Baosong, Cao Dianli

Статья научная

With progressive development of innovation and technology, education in higher college should keep up with the step of times development, the bilingual teaching of advanced mathematics is just the best choice for students to grasp mathematics knowledge and simultaneously to improve English skills, and it will be an important link in improving the quality of the entire Chinese nation. Through the bilingual teaching practice, the authors put emphasis on the important role of bilingual teaching in advanced mathematics, and further raised strategies in how to improve university students’ comprehensive ability based on bilingual teaching of advanced mathematics.

Бесплатно

Binary Encoding Differential Evolution for Combinatorial Optimization Problems

Binary Encoding Differential Evolution for Combinatorial Optimization Problems

Changshou Deng, Bingyan Zhao, Yanlin Yang, Hai Zhang

Статья научная

Differential Evolution algorithm is a new competitive heuristic optimization algorithm in the continuous field. The operators in the original Differential Evolution are simple; however, these operators make it impossible to use the Differential Evolution in the binary space directly. Based on the analysis of problems led by the mutation operator of the original Differential Evolution in the binary space, a new mutation operator was proposed to enable this optimization technique can be used in binary space. The new mutation operator, which is called semi-probability mutation operator, is a combination of the original mutation operator and a new probability-based defined operator. Initial experimental results of two different combinatorial optimization problems show its effectiveness and validity.

Бесплатно

Blockchain Based Secure Traffic Police Assistant System

Blockchain Based Secure Traffic Police Assistant System

Dipti Pawade, Avani Sakhapara, Raj Shah, Siby Thampi, Vignesh Vaid

Статья научная

There are large numbers of vehicles in the populated country like India. It’s a very common scenario that traffic police came across some vehicle random vehicle and had some doubt in mind but do not have in hand information about that vehicle and end up leaving that thought. Sometimes this may result in some disaster. With the advent of technology, there are mobile applications and web based systems are available to ease up the process by which traffic police can fine the vehicle owner or people can pay the fine online. But yet there is no system is available through which traffic police can get all the details about the particular vehicle. This motivated us to design and developed an application thorough which traffic police can get all the information right from owner of the vehicle to its RC book and insurance status on just one click. Looking at the chances of data tampering, we have also played an attention to the data security and used blockchain for creating distributed, robust and tempered proof system. In this paper we have discussed traffic police assistance system, which can scan the vehicle number plate, identify the number and provide the all the information and documents stored against that vehicle number. To address the issue of data security and alteration of sensitive data blockchain is used so that any alteration can be monitored. As the complete information process is dependent on how correctly the vehicle number is identified, so the number plate recognition module is tested thoroughly under various conditions. Finally user feedback is taken and analyzed to evaluate the feasibility and usability of the proposed application.

Бесплатно

Brain Ischemic Stroke Detection through Deep Learning: A Systematic Review on CT vs MRI vs CTA Images

Brain Ischemic Stroke Detection through Deep Learning: A Systematic Review on CT vs MRI vs CTA Images

Rathin Halder, Nusrat Sharmin

Статья научная

Purpose: Ischemic brain strokes have a high morbidity and death rate, thus it’s vital to obtain a quick diagnosis and imaging. Computer-aided diagnosis (CAD) has become popular in medical imaging and diagnostic radiology research. In the field of medical image analysis, deep learning (DL) approaches have recently shown greater performance over earlier, more advanced machine learning techniques. Acute Ischemic stroke (AIS) is one of the medical sectors where DL has conducted substantial research. The systematic review examines the performance of deep learning models across different imaging modalities, highlighting their strengths and limitations in identifying ischemic strokes. Key aspects such as sensitivity, specificity, and overall accuracy are assessed, providing insights into the comparative effectiveness of CT, MRI, and CTA in stroke detection. In contrast with other reviews in this domain, this paper offers a concise summary of the most notable DL methods applied in the classification, detection, and segmentation of acute ischemic brain stroke, focusing on popular imaging techniques like Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and CT Angiography (CTA). This survey also highlights datasets and data acquisition challenges and attempts to provide a comprehensive overview of data preprocessing, as well as insight into publicly available datasets. Methods and Results: This study aims to give an idea of how training and testing datasets should be handled by evaluat- ing recent studies. This review discusses the challenges associated with each imaging modality, including image noise, artifacts, and variability in acquisition protocols. Strategies to mitigate these challenges through preprocessing techniques and model optimization are explored, aiming to improve the robustness and reliability of deep learning-based stroke de- tection systems. Moreover, this research contains a brief discussion of recent deep learning architectures and an analysis of performances. Conclusions: Overall, this systematic review contributes to the understanding of current advancements in brain ischemic stroke detection through deep learning, offering valuable insights for researchers and clinicians seeking to leverage these technologies for improved patient outcomes. Future directions and potential research avenues are also discussed to guide further advancements in this critical area of medical imaging and diagnosis.

Бесплатно

Bruteporter: a hybrid approach

Bruteporter: a hybrid approach

Balamurugan Mahalingam, Kannan S., Vairaprakash Gurusamy

Статья научная

Stemming fetches the main root word from the inflectional words called stem. Stem gives different meaning when suffix or prefix is added to it. The stem need not give perfect meaning. Lemmatization gives lemma from inflectional words. Lemma should give meaning that in the dictionary form. Natural Language processing, Information retrieval, Text mining are the areas which use the stemming as preprocessing step. Through stemming, the size of the document can be reduced and ambiguity is also removed. It makes the work easy for other process likes information retrieval, semantic analysis, text categorization etc. Though there is a need for linguistic improvements in the existing stemming algorithms, all these algorithms fail in some cases to give an exact Root word and are not able to handle informal verbs. Hence, Bruteporter Hybrid approach is proposed in order to improve the linguistic process of stemming in English Texts. It combines the Wordnet and Modified Porter Algorithm. A Wordnet is a lexical dictionary created by linguistics people. Modified porter algorithm has both suffix removal and suffix substitution functionality. This proposed approach can extract root word from both inflectional words and informal verbs. In this paper, Experiment is conducted on proposed algorithm and the accuracy is calculated.

Бесплатно

COMBINE DIFFERENT KNOWLEDGE, TRAIN STUDENTS MECHATRONIC THINKING

COMBINE DIFFERENT KNOWLEDGE, TRAIN STUDENTS MECHATRONIC THINKING

Zhang Ziyi, Mao Zhiyong, Yang Zhiqin, Duan Kailu

Статья научная

A pedagogy of training students think in the way of mechatronics is introduced in this article. The importance of teachers’ working style in training students to think in the way of mechatronics is stated. The reason of combination of different technologies in teaching can be educed. The article also stated the importance of combination of different knowledge which can make students learn more skills easily.

Бесплатно

CarryIT: Design and Implementation of an Effective Parcel Carrying System

CarryIT: Design and Implementation of an Effective Parcel Carrying System

Khandaker Mohammad Mohi Uddin, Md Razwanul Ghani, Kazi Hozayfa Ahsan, Rafid Mostafiz, Samrat Kumar Dey

Статья научная

A plethora of courier services are available in Bangladesh which are more expensive, less effective and takes ages to deliver the product. Besides, in the ongoing COVID-19 pandemic situation, it’s onerous to move from one place to another, and if a person wants to send a product, he/she needs to go to the courier office. Moreover, many people need to move from their house for attending office, meetings, and traveling from one district to another district for special purposes. In this paperwork, a system is introduced to reduce the cost and time to send a product from one place to another place. Basically, an application is developed to meet the people who want to send a product and another one who want to carry the product. For carrying the product one can easily earn money. After scrutinizing the cost of courier services in Bangladesh, an algorithm is introduced to calculate the carrying cost of the product and an algorithm is also developed for product security.

Бесплатно

Change Impact Identification in Object-Oriented System: Dependence Graph Approach

Change Impact Identification in Object-Oriented System: Dependence Graph Approach

Abdi Mustapha Kamel, Dinedane Mohammed Zoheir

Статья научная

The development of software products consumes a lot of time and resources. On the other hand, these development costs are lower than maintenance costs, which represent a major concern, specially, for systems designed with recent technologies. Systems modification should be taken rigorously, and change effects must be considered. The need to offer tools allowing on the one hand, to explain the mechanisms of changes at the source code level, and on the other hand, to reduce the effort as well as the cost of maintenance, is affirmed more and more. We propose in this article an approach based on dependence graph to identify change impact of object-oriented systems. The analysis of change ripple effect is made on the dependence graph representing the considered system. The identification at graph level of maximum range of change ripple effect will enable us to know consequences change at code source of system. This knowledge will enable us to estimate the change cost and to make a compromise between the various suggested changes. Finally, to concretize this study we produced a tool and tested our approach on certain systems.

Бесплатно

Circuit Design of RF Remote Controller in Code Matching Mode

Circuit Design of RF Remote Controller in Code Matching Mode

Weidong Zhang, Gengsheng Zheng, Qifu Liu

Статья научная

The concept and the state of the art of RF are reviewed firstly, as well as the superiority over the infrared. Then the design of the software and circuits of RF remote controller in code matching mode (RFRCCMM) is introduced, as well as the chip selection and the interface of SPI. The design approach of RFRCCMM is presented with the interpretation about the distribution of components and the layout.

Бесплатно

Classification of Coronary Artery Disease Using Different Machine Learning Algorithms

Classification of Coronary Artery Disease Using Different Machine Learning Algorithms

Bahar Nazlı, Yasemin Gültepe, Hayriye Altural

Статья научная

Coronary Artery Disease (CAD) takes place in the category of fatal diseases resulting in death in our country and around the world. Each year about 340 thousand patients lost their lives due to CAD in Turkey. Early diagnosis is essential to reduce risk and prolong lifetime of these patients for diseases that require long-term treatment having death risk like CAD. For this reason, classification of CAD by using medical data processing and machine learning algorithms are important in order to develop assistive or expert systems for physicians. In this study, five different machine learning algorithms were applied to estimate whether patients in the Z-Alizadeh Sani data set extracted from the UCI machine learning pool are CAD. Accuracy, precision, recall, specificity and F1 score were compared as classification performance indicators to evaluate decision tree, random forest (RF), support vector machines (SVM), nearest neighborhood (k-NN) and multi-layer sensor (MLP) methods. According to the evaluation results, the MLP method gave high classification accuracy with 90%. It also appears that RF performs relatively better than other metrics. This results, show that these classification algorithms can be use for helping healthcare systems.

Бесплатно

Журнал