International Journal of Modern Education and Computer Science @ijmecs
Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1160
Статья научная
Learning practices commenced to shift from face-to-face offline class learning to online classes with technological networks specifically on sudden COVID-19 crises. . This sort of variation in their learning method sparks question about students' perception of the new learning system. The objective of the study was to compare English language learning, between online classes and Offline-classes and it explicates different students' perceptions of such learning practices regarding the benefits, improvements, and drawbacks of online and offline modes. The research approach of study, proceeds with a quantitative study, using statistical analysis through questionnaire distribution. The participants of the study were the school students, obtained from Government and private schools in Telangana. The quality of the study stands outstanding in addressing the effectiveness of blended learning both online and offline learning and aids to study nature of the approach if integration of learning modes including face-to face and online learning incorporated and the consideration to improvise qualities learning experiences of students. With those aspects, the research is significant to prove the preference of students to elucidate that offline classroom learning is more preferable than online English learning. The value of the research is recognised that it aids the educators, leadership authorities and researchers to understand parameters leading to efficient learning practices, enhanced collaborative student performance outcomes assisting to select the appropriate technologies in case of any pandemic crisis and to inhibit collaborative learning in and out of classroom. The most general obstacles faced by students in online English learning are materials insufficiency, lack of communicative skills training, lacking reading activities participation, absence of interaction, the inability of queries or doubts clarification, and exercise exposure are addressed by the analysis outcomes. The comparative perception outcomes explicated that Offline English language learning stands out as more efficient than the online learning method.
Бесплатно
An Energy-Efficient and Robust Voltage Level Converter for Nanoelectronics
Статья научная
Low-power design has recently become very important especially in nanoelectronic VLSI circuits and systems. Functioning of circuits at ultra-low voltages leads to lower power consumption per operation. An efficient method is to separate the logic blocks based on their performance requirement and applying a specific supply voltage for each block. In order to prevent an enormous static current in these multi-VDD circuits, voltage level converters are essential. This study presents an energy-efficient and robust single-supply level converter (SSLC) based on multi-threshold carbon nanotube FETs (CNTFETs). Unique characteristics of the CNTFET device and transistor stacking are utilized suitably to reduce the power and energy consumption of the proposed LC. The results of the extensive simulations, conducted using 32nm CNTFET technology of Stanford University indicate the superiority of the proposed design in terms energy-efficiency and robustness to process, voltage and temperature variations, as compared to the other conventional and state-of-the-art LC circuits, previously presented in the literature. The results demonstrate almost on average 35%, 55%, 90% and 68% improvements in terms of delay, total power, static power and energy consumption, respectively.
Бесплатно
An Enhanced Action Research Approach for Managing Risks in Software Process Improvement
Статья научная
Managing risks in Software Process Improvement (SPI) is a key point of software success. A software risk is considered as an essential characteristic of software development process which if ignored will increase the chance of project failure. For this purpose different risk management approaches are developed. These approaches lead to the identification, assessment and control of risk occurrence in software projects. Collaborative Practice Research (CPR) is one of the action research approaches for managing risk in SPI. In this approach the focus is on gathering information regarding SPI and acknowledging risk management in process development by developing risk assessment strategies and models. The main challenge of this action research approach is to validate the developed risk approach. This paper has a critical review on the existing research approach i.e. CPR. It also provides an enhanced form of CPR which modifies the current CPR approach by including a risk validation activity.
Бесплатно
An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA
Статья научная
Image watermarking is the process of the hiding the one image into other image for the copyright protection. The process of watermarking must be done in this way that the pixels of the original image must remain in its original HD form. A lot of work has been done in this context in previous years but some techniques have their own applications, drawbacks as well as advantages. So, this paper will utilize three techniques i.e. Discreet Wavelet Transform (DWT), Neural Network (NN) and RSA encryption for image watermarking. In the end the performance of the proposed technique will be measured on the basis of PSNR, MSE, BCR, BER and NCC in MATLAB R2010a environment.
Бесплатно
An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering
Статья научная
A new approach to data stream clustering with the help of an ensemble of adaptive neuro-fuzzy systems is proposed. The proposed ensemble is formed with adaptive neuro-fuzzy self-organizing Kohonen maps in a parallel processing mode. Their learning procedure is carried out with different parameters that define a nature of cluster borders' blurriness. Clusters' quality is estimated in an online mode with the help of a modified partition coefficient which is calculated in a recurrent form. A final result is chosen by the best neuro-fuzzy self-organizing Kohonen map.
Бесплатно
An Evaluation of the Critical Factors Affecting the Efficiency of Some Sorting Techniques
Статья научная
Sorting allows information or data to be put into a meaningful order. As efficiency is a major concern of computing, data are sorted in order to gain the efficiency in retrieving or searching tasks. The factors affecting the efficiency of shell, Heap, Bubble, Quick and Merge sorting techniques in terms of running time, memory usage and the number of exchanges were investigated. Experiment was conducted for the decision variables generated from algorithms implemented in Java programming and factor analysis by principal components of the obtained experimental data was carried out in order to estimate the contribution of each factor to the success of the sorting algorithms. Further statistical analysis was carried out to generate eigenvalue of the extracted factor and hence, a system of linear equations which was used to estimate the assessment of each factor of the sorting techniques was proposed. The study revealed that the main factor affecting these sorting techniques was time taken to sort. It contributed 97.842%, 97.693%, 89.351%, 98.336% and 90.480% for Bubble sort, Heap sort, Merge sort, Quick sort and Shell sort respectively. The number of swap came second contributing 1.587% for Bubble sort, 2.305% for Heap sort, 10.63% for Merge sort, 1.643% for Quick sort and 9.514% for Shell sort. The memory used was the least of the factors contributing negligible percentage for the five sorting techniques. It contributed 0.571% for Bubble sort, 0.002% for Heap sort, 0.011% for Merge sort, 0.021% for Quick sort and 0.006% for Shell sort.
Бесплатно
An Evolving Neuro-Fuzzy System with Online Learning/Self-learning
Статья научная
A new neuro-fuzzy system's architecture and a learning method that adjusts its weights as well as automatically determines a number of neurons, centers' location of membership functions and the receptive field's parameters in an online mode with high processing speed is proposed in this paper. The basic idea of this approach is to tune both synaptic weights and membership functions with the help of the supervised learning and self-learning paradigms. The approach to solving the problem has to do with evolving online neuro-fuzzy systems that can process data under uncertainty conditions. The results proves the effectiveness of the developed architecture and the learning procedure.
Бесплатно
An Experimental Study on College Teacher's Adoption of Instructional Technology
Статья научная
Instructional technology can make teachers do their jobs easier, better, faster and more effectively. Students can also benefit from its application. However, some college teachers do not adopt instructional technologies in their teaching as we expected. They like to teach the way they were taught as students before. Why and what factors really influence their adoption of instructional technology? This study offered a model suggestiong instructional technology adoption by college teachers depends on: the student, the teacher, the technology and the surroundings. An experiment was designed to verify the model. Samples were selected from teachers at a mid-sized university. Experimental data was collected by interviewing fifteen teachers (samples). Those interviewed represented five high-level users, five medium-level users, and five low-level users of instructional technology. Quantitative methods such as frequency counting were used to analyze and sort the data. Finally, conclusions can be drawn that different components in the model had different influential degree to the different levels of users of instructional technology.
Бесплатно
An Identification of Better Engineering College with Conflicting Criteria using Adaptive TOPSIS
Статья научная
Students like to find better engineering college for their higher education. It is very challenging to find the better engineering college with conflicting criteria. In this research, the criterion such as academic reputation and achievements, infrastructure, fees structure, location, quality of the faculty, research facilities and other criterion are considered to find the better engineering college. Multi Criteria Decision Making (MCDM) is the most well known branch of decision making under the presence of conflicting criteria. TOPSIS is one of the MCDM technique widely applied to solve the problems which involves many number of criteria. In this research, TOPSIS is Adaptive and applied to find better engineering college. To evaluate the proposed methodology the parameters such as time complexity, space complexity, sensitivity analysis and rank reversal are considered. In this comparative analysis, better results are obtained for Adaptive TOPSIS compared to COPRAS.
Бесплатно
An Identity-based Blind Signature Approach for E-voting System
Статья научная
Electronic voting is a voting process using electronic mean that allows voters to cast their secret and secure vote over an unsecured channel. Many forward-thinking countries are adopting the electronic voting system to upgrade their election process. Since E-voting system is more complex so it requires more security as compared to the postal voting system. One of the fine tool to provide the voter anonymity is the blind signature scheme. Many blind signature proposals based on traditional public key cryptosystem have been discussed, however, they get the worst of certificate and public key management. In this sense, the objective of the paper is twofold. Firstly, we proposed a blind signature scheme using the identity-based cryptosystem. Proposed scheme uses the combination of Bolyreva’s blind signature scheme and Cha-Chaon’s Identity-based signature. Secondly, we show that proposed scheme is more suitable for E-voting system as compared with others ID-based blind signature scheme.
Бесплатно
An Improved Chaotic Bat Algorithm for Solving Integer Programming Problems
Статья научная
Bat Algorithm is a recently-developed method in the field of computational intelligence. In this paper is presented an improved version of a Bat Meta-heuristic Algorithm, (IBACH), for solving integer programming problems. The proposed algorithm uses chaotic behaviour to generate a candidate solution in behaviors similar to acoustic monophony. Numerical results show that the IBACH is able to obtain the optimal results in comparison to traditional methods (branch and bound), particle swarm optimization algorithm (PSO), standard Bat algorithm and other harmony search algorithms. However, the benefits of this proposed algorithm is in its ability to obtain the optimal solution within less computation, which save time in comparison with the branch and bound algorithm (exact solution method).
Бесплатно
An Improved Method of Geometric Hashing Pattern Recognition
Статья научная
Geometric hashing (GH) is a general model-based recognition scheme. GH is widely used in the industrial products assembly and inspection tasks. The aim of this study is to speed up the geometric hashing pattern recognition method for the purpose of real-time object detection applications. In our method, a pattern is decomposed into some sub-patterns to reduce the data number in hash table bins. In addition, the sub-patterns are recorded in a plurality of hash tables. Finally we improve the recognition performance by combining with image pyramid and edge direction information. To confirm the validity of our proposed method, we make a complexity analysis, and apply our method to some images. Both complexity analysis and experiment evaluations have demonstrated the efficiency of this technique.
Бесплатно
An Improved Text Clustering Method based on Hybrid Model
Статья научная
According to the high-dimensional sparse features on the storage of textual document, and defects existing in the clustering methods or the hybrid methods which have already been studied by now and some other problems. So an improved text clustering method based on hybrid model, that is a text clustering approach (short for TGSOM-FS-FKM) based on tree-structured growing self-organizing maps (TGSOM) and Fuzzy K-Means (FKM) is proposed. The method has optimized the clustering result through three times of clustering. It firstly makes preprocess of texts, and filters the majority of noisy words by using an unsupervised feature selection method. Then it used TGSOM to execute the first clustering to get a rough classification of texts, and to get the initial clustering number and each text’s category. And then introduced LSA theory to improve the precision of clustering and reduce the dimension of the feature vector. After that, it used TGSOM to execute the second clustering to get more precise clustering results, and used supervised feature selection method to select feature items. Finally, it used FKM to cluster the result set. In the experiment, it remained the same number of feature items and experimental results indicate that TGSOM-FS-FKM clustering excels to other clustering method such as DSOM-FS-FCM, and the precision is better than DSOM-FCM, DFKCN and FDMFC clustering.
Бесплатно
An Improved, Efficient and Cost Effective Software Inspection Meeting Process
Статья научная
Normally, the inspection process is seemed to be just finding defects in software during software development process lifecycle. Software inspection is considered as a most cost effective technique, but if these defects are not properly corrected or handled it would cost you more than double later in the project. This paper focus on the last phase of inspection meeting process showing the importance of Follow-Up Stage in software inspection meeting process. This paper also suggests a set of activities that should be performed during the Rework and Follow-Up Stages so to get inspection meeting results productive and efficient. In this paper we focus on the over the shoulder reviews so to ensure the software quality having less impact on the total software cost.
Бесплатно
Статья научная
Security is the major part of home automation systems for the people. With the development of network and automatic control technology, a home security monitoring and alarming system becomes more and more practicable today. In this paper we have proposed simple, low cost, low power consumption and a novel method for implementing the home security using Zigbee (802.15.4) standard and also a security protocol for detecting and localizing identity based attacks in the system. We have named our scheme as Wireless Home Security System (WHSS) and protocol as Wireless Home Security Protocol (WHSP). It consists of many sensor nodes deployed in the rooms as well as the doors/ windows of the house together with the zigbee modules which act as end devices that monitor continuously and send the security status of each room to the coordinator node connected to a PC which acts as the master. The communication in this case is multi-hop which provides unlimited range. Here we have used the XBEE Pro series1 (XBP24-AWI-001) radios for RF communication, DYP-ME003 PIR sensor, and Contact Door / window sensor based on magnetic reed switch (ORD221).The hardware implementation has been tested for validation successfully. The software has been implemented using C#. Also the performance of our proposed security protocol has been analysed using NS2 and is found to be satisfactory.
Бесплатно
An Insight to Soft Computing based Defect Prediction Techniques in Software
Статья научная
Nowadays, the complexity and size of software systems is proliferating. These factors have various pros and cons. On one side where they lead to better performance and satisfactory results, on the other side they lead to high testing cost , wacky results , poor quality and non-reliability of the product. These problems have one root cause which is referred to as defects in the software systems Predicting these defects can not only rule out the cons but can also boost up the pros. Various techniques are present for the same which are reviewed in depth in this paper. Moreover, a comparison of these techniques is also done to throw a lime light on those which provide the best results.
Бесплатно
Статья научная
In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced Caesar Cipher method, TTJSA method, Bit wise Rotation and Reversal method. The encryption method consists of three basic steps: 1) Encryption Technique using Advanced Caesar Cipher, 2) Encryption Technique using TTJSA Algorithm, and 3) Encryption Technique using Bit wise Rotation and Reversal. TTJSA Algorithm, used in this method, is again a combination of generalized modified Vernam Cipher method, MSA method and NJJSAA method. Nath et al. already developed some symmetric key encryption methods namely MSA, DJSA, DJJSA, modified DJJSA, NJJSA, TTJSA, TTSJA, DJMNA, UES-I, UES-II etc. The cryptanalysis shows that TTJSA is free from standard cryptographic attacks such as differential attack, plain text attack or any brute force attack. In the present method the authors have used advanced modified Caesar Cipher method where the authors have modified the standard Caesar Cipher method and then they applied TTJSA method to make the entire crypto system very hard to break. The present method has been tested on different plain text specially with repeated character and the spectral analysis of the plain text and the encrypted is also been shown. The spectral analysis shows that the present cryptography method, SJA can not be broken with any kind of standard cryptography attack. The authors propose that the present method will be most suitable for password, SMS or any kind of small message encryption.
Бесплатно
An Intelligent System for Detecting Fake Materials on the Internet
Статья научная
There has been a significant rise in internet usage in recent years, which has led to the presence of data theft and the diversity of counterfeit materials. This has resulted the proliferation of cybercrimes and the theft of personal data via social media, e-mail, and phishing websites that are similar to the websites commonly used to grab user data details like that of a credit card or login ID. Phishing, a prevalent form of cybercrime, poses a danger to online security through the theft of personal information, and with the emergence of the COVID-19 virus, which has led to people and organizations being drawn towards the Internet and many people and companies being forced to work remotely, it has led to an increase in the existing phishing threats. Previously, hackers took advantage of the situation to infiltrate the devices of people and companies in numerous ways, which caused huge financial losses and damage to organizations. Based on previous results and research, Machine Learning (ML) is selected by researchers as an efficient method for identifying malicious software web pages from original web pages. This paper presents 30 characteristics of websites, which are analyzed using a correlation matrix to determine the relationship between variables. Feature selection is performed through a wrapper method and Extra Tree Classifiers (ETC) to identify the top-ranked characteristics (Features) for website classification. To evaluate web pages, various machine learning techniques such as Random Forest Tree (RF), Multilayer Perceptron (MLP), Decision Tree (DT), and Support Vector Machine (SVM) are used. The results of monitoring indicate that MLP, a deep neural network, outperforms all other techniques in terms of performance.
Бесплатно
An Interactive Teaching – Learning Tool for Underprivileged Children in Rural Schools
Статья научная
In a country like India, there are children who starve for food, water and cannot spend time for studying and they have to work hard, to get one meal a day. The dropouts in schools are high because of various reasons. Education is not at affordable cost, government must bring some schemes. 80% schools suffer from shortage of teachers, infrastructural gaps and several habitations. There are also frequent allegations of government schools being riddled with absenteeism and mismanagement and appointments are based on political convenience. Despite the allure of free lunch-food in the government schools, many parents send their children to private schools. As a result, proponents of low cost private schools, critiqued government schools as being poor value for money. Furthermore, many international schools with most modern Information Communication Technology (ICT) tools are mushrooming even in remote villages because the rural elites who are able to afford school fees in a country where large number of families live in absolute poverty. The major objective of this paper is to develop an interactive teaching-learning tool with multimedia applications for underprivileged children in rural schools. This tool will help the rural school children to have quality education at an affordable cost.
Бесплатно
An Investigation and Structure Model Study on College Students'Studying-interest
Статья научная
Nowadays college students’ studying-weariness is a common problem needs to be solved in China. Also, college students' studying-interest, studying-weariness psychology and misbehaviors have been the subject of considerable research in the last few years to educators and researchers all over the world. However, most of the existing studies in this field are qualitative theory analysis and short of actual investigation, survey and even less mathematical quantificational study. The investigation and study on studying-interest of college students from four universities in Wuhan demonstrates that college students show generally studying-weary mentality and correlative misbehaviors. With the designed college students' learning-interest questionnaire, college students in four universities of Wuhan were surveyed. And based on this survey, Structural Equation Model (SEM) was used to analyze the date of our investigation of the factors affecting college students’ studying-interest and studying-weariness. Results of our quantitative statistical analysis with mathematical model show the degree of each factor influencing studying-interest and studying-weariness. School-related factor and society-related factor are the main influences on college students’ studying-interest and studying-weariness. The major objective of this paper is to provide an integrative review of the college students’ studying-interest and studying-weariness, in order to contribute to the development of high education. Countermeasures and Suggestions are also put forward to rectify the college students’ studying-weariness. This work will play an important role for education departments and educators to take corresponding measures to provide scientific guidance of high education.
Бесплатно