International Journal of Education and Management Engineering @ijeme
Статьи журнала - International Journal of Education and Management Engineering
Все статьи: 643

Binary Encoding Differential Evolution for Combinatorial Optimization Problems
Статья научная
Differential Evolution algorithm is a new competitive heuristic optimization algorithm in the continuous field. The operators in the original Differential Evolution are simple; however, these operators make it impossible to use the Differential Evolution in the binary space directly. Based on the analysis of problems led by the mutation operator of the original Differential Evolution in the binary space, a new mutation operator was proposed to enable this optimization technique can be used in binary space. The new mutation operator, which is called semi-probability mutation operator, is a combination of the original mutation operator and a new probability-based defined operator. Initial experimental results of two different combinatorial optimization problems show its effectiveness and validity.
Бесплатно

Blockchain Based Secure Traffic Police Assistant System
Статья научная
There are large numbers of vehicles in the populated country like India. It’s a very common scenario that traffic police came across some vehicle random vehicle and had some doubt in mind but do not have in hand information about that vehicle and end up leaving that thought. Sometimes this may result in some disaster. With the advent of technology, there are mobile applications and web based systems are available to ease up the process by which traffic police can fine the vehicle owner or people can pay the fine online. But yet there is no system is available through which traffic police can get all the details about the particular vehicle. This motivated us to design and developed an application thorough which traffic police can get all the information right from owner of the vehicle to its RC book and insurance status on just one click. Looking at the chances of data tampering, we have also played an attention to the data security and used blockchain for creating distributed, robust and tempered proof system. In this paper we have discussed traffic police assistance system, which can scan the vehicle number plate, identify the number and provide the all the information and documents stored against that vehicle number. To address the issue of data security and alteration of sensitive data blockchain is used so that any alteration can be monitored. As the complete information process is dependent on how correctly the vehicle number is identified, so the number plate recognition module is tested thoroughly under various conditions. Finally user feedback is taken and analyzed to evaluate the feasibility and usability of the proposed application.
Бесплатно

Статья научная
Purpose: Ischemic brain strokes have a high morbidity and death rate, thus it’s vital to obtain a quick diagnosis and imaging. Computer-aided diagnosis (CAD) has become popular in medical imaging and diagnostic radiology research. In the field of medical image analysis, deep learning (DL) approaches have recently shown greater performance over earlier, more advanced machine learning techniques. Acute Ischemic stroke (AIS) is one of the medical sectors where DL has conducted substantial research. The systematic review examines the performance of deep learning models across different imaging modalities, highlighting their strengths and limitations in identifying ischemic strokes. Key aspects such as sensitivity, specificity, and overall accuracy are assessed, providing insights into the comparative effectiveness of CT, MRI, and CTA in stroke detection. In contrast with other reviews in this domain, this paper offers a concise summary of the most notable DL methods applied in the classification, detection, and segmentation of acute ischemic brain stroke, focusing on popular imaging techniques like Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and CT Angiography (CTA). This survey also highlights datasets and data acquisition challenges and attempts to provide a comprehensive overview of data preprocessing, as well as insight into publicly available datasets. Methods and Results: This study aims to give an idea of how training and testing datasets should be handled by evaluat- ing recent studies. This review discusses the challenges associated with each imaging modality, including image noise, artifacts, and variability in acquisition protocols. Strategies to mitigate these challenges through preprocessing techniques and model optimization are explored, aiming to improve the robustness and reliability of deep learning-based stroke de- tection systems. Moreover, this research contains a brief discussion of recent deep learning architectures and an analysis of performances. Conclusions: Overall, this systematic review contributes to the understanding of current advancements in brain ischemic stroke detection through deep learning, offering valuable insights for researchers and clinicians seeking to leverage these technologies for improved patient outcomes. Future directions and potential research avenues are also discussed to guide further advancements in this critical area of medical imaging and diagnosis.
Бесплатно

Bruteporter: a hybrid approach
Статья научная
Stemming fetches the main root word from the inflectional words called stem. Stem gives different meaning when suffix or prefix is added to it. The stem need not give perfect meaning. Lemmatization gives lemma from inflectional words. Lemma should give meaning that in the dictionary form. Natural Language processing, Information retrieval, Text mining are the areas which use the stemming as preprocessing step. Through stemming, the size of the document can be reduced and ambiguity is also removed. It makes the work easy for other process likes information retrieval, semantic analysis, text categorization etc. Though there is a need for linguistic improvements in the existing stemming algorithms, all these algorithms fail in some cases to give an exact Root word and are not able to handle informal verbs. Hence, Bruteporter Hybrid approach is proposed in order to improve the linguistic process of stemming in English Texts. It combines the Wordnet and Modified Porter Algorithm. A Wordnet is a lexical dictionary created by linguistics people. Modified porter algorithm has both suffix removal and suffix substitution functionality. This proposed approach can extract root word from both inflectional words and informal verbs. In this paper, Experiment is conducted on proposed algorithm and the accuracy is calculated.
Бесплатно

COMBINE DIFFERENT KNOWLEDGE, TRAIN STUDENTS MECHATRONIC THINKING
Статья научная
A pedagogy of training students think in the way of mechatronics is introduced in this article. The importance of teachers’ working style in training students to think in the way of mechatronics is stated. The reason of combination of different technologies in teaching can be educed. The article also stated the importance of combination of different knowledge which can make students learn more skills easily.
Бесплатно

CarryIT: Design and Implementation of an Effective Parcel Carrying System
Статья научная
A plethora of courier services are available in Bangladesh which are more expensive, less effective and takes ages to deliver the product. Besides, in the ongoing COVID-19 pandemic situation, it’s onerous to move from one place to another, and if a person wants to send a product, he/she needs to go to the courier office. Moreover, many people need to move from their house for attending office, meetings, and traveling from one district to another district for special purposes. In this paperwork, a system is introduced to reduce the cost and time to send a product from one place to another place. Basically, an application is developed to meet the people who want to send a product and another one who want to carry the product. For carrying the product one can easily earn money. After scrutinizing the cost of courier services in Bangladesh, an algorithm is introduced to calculate the carrying cost of the product and an algorithm is also developed for product security.
Бесплатно

Change Impact Identification in Object-Oriented System: Dependence Graph Approach
Статья научная
The development of software products consumes a lot of time and resources. On the other hand, these development costs are lower than maintenance costs, which represent a major concern, specially, for systems designed with recent technologies. Systems modification should be taken rigorously, and change effects must be considered. The need to offer tools allowing on the one hand, to explain the mechanisms of changes at the source code level, and on the other hand, to reduce the effort as well as the cost of maintenance, is affirmed more and more. We propose in this article an approach based on dependence graph to identify change impact of object-oriented systems. The analysis of change ripple effect is made on the dependence graph representing the considered system. The identification at graph level of maximum range of change ripple effect will enable us to know consequences change at code source of system. This knowledge will enable us to estimate the change cost and to make a compromise between the various suggested changes. Finally, to concretize this study we produced a tool and tested our approach on certain systems.
Бесплатно

Circuit Design of RF Remote Controller in Code Matching Mode
Статья научная
The concept and the state of the art of RF are reviewed firstly, as well as the superiority over the infrared. Then the design of the software and circuits of RF remote controller in code matching mode (RFRCCMM) is introduced, as well as the chip selection and the interface of SPI. The design approach of RFRCCMM is presented with the interpretation about the distribution of components and the layout.
Бесплатно

Classification of Coronary Artery Disease Using Different Machine Learning Algorithms
Статья научная
Coronary Artery Disease (CAD) takes place in the category of fatal diseases resulting in death in our country and around the world. Each year about 340 thousand patients lost their lives due to CAD in Turkey. Early diagnosis is essential to reduce risk and prolong lifetime of these patients for diseases that require long-term treatment having death risk like CAD. For this reason, classification of CAD by using medical data processing and machine learning algorithms are important in order to develop assistive or expert systems for physicians. In this study, five different machine learning algorithms were applied to estimate whether patients in the Z-Alizadeh Sani data set extracted from the UCI machine learning pool are CAD. Accuracy, precision, recall, specificity and F1 score were compared as classification performance indicators to evaluate decision tree, random forest (RF), support vector machines (SVM), nearest neighborhood (k-NN) and multi-layer sensor (MLP) methods. According to the evaluation results, the MLP method gave high classification accuracy with 90%. It also appears that RF performs relatively better than other metrics. This results, show that these classification algorithms can be use for helping healthcare systems.
Бесплатно

Classification of Food Objects Using Deep Convolutional Neural Network Using Transfer Learning
Статья научная
With the advancements of Deep Learning technologies, its application has broadened into the fields of food classification from image recognition using Convolutional Neural Network, since food ingredient classification is a very important aspect for eating habit recognition and also reducing food waste. This research is an addition to the previous research with a clear illustration for deep learning approaches and how to maximize the classification accuracy to get a more profound framework for food ingredient classification. A fine-tuned model based on the Xception Convolutional Neural Network model trained with transfer learning has been proposed with a promising accuracy of 95.20% which indicates a greater scope of accurately classifying food objects with Xception deep learning model. Higher rate of accuracy opens the door of further research of identifying various new types of food objects through a robust approach. The main contribution in the research is better fine-tuning features of food classification. The dataset used in this research is the Food-101 Dataset containing 101 classes of food object images in the dataset.
Бесплатно

Classroom Management Strategies and Academic Performance of Junior High School Students
Статья научная
The study examined the influence of classroom management strategies of Junior High School teachers on the academic performance of students in the Ashanti Akim North District. The descriptive survey design was used for the study. One hypothesis and two research questions were developed to guide the study. Multistage sampling technique was used to select 48 teachers and 297 year two students to respond to the Behaviour and Instructional Management Scale (BIMS). Test scores in English Language, Integrated Science, Mathematics and Social Studies were used to measure students’ academic performance. The statistical tools used to analyse the data collected were means, standard deviation, Pearson’s Product Moment Correlation Coefficient (PPMCC) and Multiple Regression. The findings revealed that both students and teachers identified good relationship and reinforcement as the mostly used classroom management strategies. It was found that a significant positive relationship existed between reinforcement and antecedent as classroom management schemes and students’ academic performance. However, good relationship and punishment as classroom management strategies did not have a positive relationship with the academic performance of students. It is recommended that teachers should use reinforcement and antecedent strategies frequently in their classrooms since they play a dual role of managing behaviour and predicting the academic performance of students. Good relationship as a classroom management strategy should be cautiously used because it could potentially be misinterpreted or abused and can lead to low academic performance. Using punishment as a classroom management strategy should be avoided as its use hinders academic performance of students.
Бесплатно

Classroom Teaching Expansion of Computer Fundamentals Course
Статья научная
This paper mainly studies classroom teaching expansion of Computer Fundamentals Course. The classroom teaching of Computer Fundamentals Course can be expanded in the perspectives of time and space by using various resources such as library, Internet, science and technology market for non-computer major students. As shown in the practice results the students have really benefited a lot from these efforts.
Бесплатно

Cloud Computing a Solution for Globalization
Статья научная
Security issues and exploded human population in the world have dictated many new trends to defend haves from have-nots and vice versa, like globalization through social media while maintaining the geographical boundaries and concept introduced under WTO (World Trade Organization)- Free trading in the world. We know that Globalization is the most significant part of this century which is based only and only upon developments in Information Technology in form of Networking and Software solutions. As business grows, multiregional offices are needed and they required networked computing and information services. For example In Pakistan, lots of offices of multinational companies are working and they are developing and enhancing their business by full filling the demand and needs of customers of the particular city or country. The demand is increasing manifold with every day passing. So huge computing and storage power is needed everywhere and to everyone at every moment which is beyond the capacity of traditional systems already in vogue. New solutions like Cloud computing seems the solution to address such multi-scaled demands. Education system nowadays is the growing business in Pakistan, in this we paper we studied in detail the Education System of Pakistan, what are the flaws of current system and how a new cloud based E-Learning solution helps to improve this system.
Бесплатно

Cloud computing: issues and risks of embracing the cloud in a business environment
Статья научная
Over the latest couple of years, cloud computing has created from being a promising business thought to one of the rapidly creating portions of the IT business. Despite the boom of cloud and the numerous favorable circumstances, for example, financial advantage, rapid elastic resource pool, and on-demand benefit, endeavor clients are yet hesitant to send their business in the cloud and the paradigm likewise makes difficulties for the two clients and suppliers. An absence of fitting answers for such difficulties may cause dangers, which may exceed the normal advantages of utilizing the paradigm. To address the difficulties and related dangers, an orderly hazard the board practice is vital that guides clients dissect the two advantages and dangers identified with cloud-based frameworks. The point of this paper is to provide better comprehension to configuration difficulties of cloud computing and distinguish essential research heading in such manner as this is an expanding area.
Бесплатно

Collaborative Spam Mail Filtering Model Design
Статья научная
This thesis analyzes the characteristic and regulation of anti-spam technologies. Based of these facts, this paper brings forward a collaborative anti-spam filtering model for E-mail. Our system not only defends the repeated spam mails at the router layer but also has a higher accuracy than Spam Assassin. Presents the structure of the model and give some necessary sketch maps. Explicates carefully our idea of the design and many technologies related to the model and discusses especially many key-points too. Finally, we give the experiment results.
Бесплатно

College Student Population Size and Management Strategy
Статья научная
When the student population size of a school or college reaches a certain amount or critical value, student groups will occur a qualitative change, this can be seen most clearly occurrence of various incidents is a conspicuous rise within student groups, the type of incidents occurred more is diverse and facing the situation is even more complex. The article attempts to puts forward the critical value of a school entity population size and its impact factors, and states the management strategy after the population size exceeded the critical value from the viewpoints of proportionate relationships of teachers and students.
Бесплатно

Статья научная
The data mining classification techniques and analysis can enable banks to move precisely classify consumers into various credit risk group. Knowing what risk group a consumer falls into would allows a bank to fine tune its lending policies by recognizing high risk groups of consumers to whom loans should not be issued, and identifying safer loans that should be issued on terms commensurate with the risk of default. So research en for classification and prediction of loan grants. The attributes are determined that have greatest effect in the loan grants. For this purpose C4.5, CART and Naïve Bayes are compared and analyzed in this research. This concludes that a bank should not only target the rich customers for granting loan but it should assess the other attributes of a customer as well which play a very important part in credit granting decisions and predicting the loan defaulters.
Бесплатно

Comparative Analysis of Two Programming Platforms for Beginners: Python and Scratch
Статья научная
This research paper conducts a comparative analysis of Python and Scratch, exploring their strengths and weaknesses in introductory programming education. While Scratch serves as an excellent starting point, it has limitations, prompting discussions about its suitability for all learners. Some argue that starting with Scratch facilitates a smoother transition into Python, while others suggest its effectiveness in attracting beginners to computer science. The study, conducted over 12 weeks among beginners in a Nigerian higher institution, aims to assess factors such as ease of learning, versatility, community support, and real-world application on both platforms. The first 4 weeks, participants were introduced to Scratch, then were introduced to Python from week 5 to 8 and finally week 9 to 12 were to work on projects and compare both platforms. The research delves into the experiences of participants lacking prior programming experience, emphasizing the exploration of thematic analysis, System Usability Scale (SUS) scores and individual responses. A total of four evaluations were carried out. Results from the thematic analysis of the 1st evaluation using thematic analysis reveals that Scratch has the ability to foster computational thinking. The 2nd evaluation reveals that Scratch is preferred for tasks such as game development which has the ability to further deepen their programming experience. In the third evaluation, 46.3% of the participants agreed that experience gained from Scratch was helpful in learning Python while 70% agreed to some or a great extent that knowledge and skills acquired from learning Scratch was transferable to learning Python. The fourth evaluation was to understand the ease of use of Scratch versus Python using SUS. The results from SUS notably reveal that the limited number of female participants showed intriguing preferences, with a lone female participant indicating a higher preference for Scratch. However, examining individual responses revealed a consistent outlier, with all participants expressing a higher preference for using Python more frequently than Scratch, despite their initial exposure to both platforms. This research suggests that the choice between Python and Scratch goes beyond syntax preferences, involving pedagogical strategies and the learning experiences each platform offers. This research contributes insights into the effectiveness of Scratch and Python in an educational setting, offering a nuanced understanding of the preferences and experiences of beginners. The findings underscore the importance of considering not only platform features but also individual learning experiences and pedagogical strategies in shaping programming education for novices.
Бесплатно

Comparative Research of Network Addiction Control Strategy among China and foreign countries
Статья научная
With the rapid development of Internet, network addiction becomes a global problem. In the foreign countries, the government occupies an leading position. People take education as the main method, and pay great attention to precaution. As a result, these measures have achieved marked results. China has probed boldly in recent years and the efforts are coming to fruition. But at the same time, there are still some problems that people think little of precaution and try anything when they are in a desperate situation. Education and society have not played deserved pole. What's more, society has negative influence to a certain extent. The article summes up the current situation and also makes comparisons of network addiction control strategy among China and foreign countries by means of analyzing characteristics of the strategy of foreign countries. Then it makes feasible recommendations of network addiction for Chinese teenagers.
Бесплатно

Статья научная
Since Interactive whiteboards (IWBs) was firstly applied to k-12 schools in Britain, the related research has increasingly developed in China, and significant findings has achieved in both countries. For a further discussion, the comparative research method on this issue is employed, together with introduction and analysis of application of IWBs in Britain and China. It comes to the following conclusions: (1) application IWBs in China is still in the first stage against Britain. (2) Systematic research supported by the integrity of government, universities and teachers makes IWBs much applicable in Britain, but China still has a long way to go in this field. (3) China concentrates on its functions as a tool excessively, rather than pays more attention to the way of how to use it. (4)Some potential utility in instructional design associated with teachers-students interaction should be considered or discussed even more. Anyway, IWBs with its inherent characteristic, tends to play an important role in teaching.
Бесплатно