Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 1080

Big data analytics for medical applications

Big data analytics for medical applications

Nivedita Das, Leena Das, Siddharth Swarup Rautaray, Manjusha Pandey

Статья научная

Big Data is an accumulation of data sets which are abundant and intricate in character. They comprise both structured and unstructured data that evolve abundant, so speedy they are not convenient by classical relational database systems or current analytical tools. Big Data Analytics is not linearly able to expand. It is a predefined schema. Now big data is very helpful for backup of data not for everything else. There is always a data introducing. It also helps to solve India’s big problems. It also helps to fill the data gap. Health care is the conservation or advancement of health along the avoidance, interpretation and medical care of disorder, bad health, abuse, and other substantial and spiritual deterioration in mortal. Health care is expressed by health experts in united health experts, specialists, physician associates, mid-wife, nursing, antibiotic, pharmacy, psychology and other health. This paper focuses on providing information in the area of big data analytics and its application in medical domain. Further it includes introduction, Challenging aspects and concerns, Big Data Analytics in use, Technical Specification, Research application, Industry application and Future applications.

Бесплатно

Binary log design for one-way data replication with ZeroMQ

Binary log design for one-way data replication with ZeroMQ

I. Gede John Arissaputra, I. Made Sukarsa, Putu Wira Buana, Ni Wayan Wisswani

Статья научная

Today, many business transactions are done online, especially in the financial sector or banking [1]. But as companies grow, many problems occur such as the inability to manage data consistency, especially when data is associated with more than one database. Replication is one of the most commonly used way of syncing data. However, to ensure data remains consistent, it is not enough just to take advantage of the replication process. The problem that often happens is connection failure or offline host. The Binary Log approach is one of the alternative methods that can be used to develop database synchronization. Generally, binary log is used for data recovery or backup purposes. Binary log in the DBMS (Database Management System) record all changes that occur in the database both at the data and structure level, as well as the duration of time used. This information can be used as a reference in updating data, while the ZeroMQ socket used as data exchange medium so data in all system locations will be synchronized and integrated in real time. This research will discuss how to develop a synchronization system by utilizing Binary Log from MySQL to recognize data changes, inherit changes, send changes, and hopefully can contribute new alternative method in developing real time database synchronization.

Бесплатно

Bio-inspired Ant Algorithms: A review

Bio-inspired Ant Algorithms: A review

Sangita Roy, Sheli Sinha Chaudhuri

Статья научная

Ant Algorithms are techniques for optimizing which were coined in the early 1990’s by M. Dorigo. The techniques were inspired by the foraging behavior of real ants in the nature. The focus of ant algorithms is to find approximate optimized problem solutions using artificial ants and their indirect decentralized communications using synthetic pheromones. In this paper, at first ant algorithms are described in details, then transforms to computational optimization techniques: the ACO metaheuristics and developed ACO algorithms. A comparative study of ant algorithms also carried out, followed by past and present trends in AAs applications. Future prospect in AAs also covered in this paper. Finally a comparison between AAs with well-established machine learning techniques were focused, so that combining with machine learning techniques hybrid, robust, novel algorithms could be produces for outstanding result in future.

Бесплатно

Biometric Palm Prints Feature Matching for Person Identification

Biometric Palm Prints Feature Matching for Person Identification

Shriram D. Raut, Vikas T. Humbe

Статья научная

Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is a unique and reliable biometric characteristic with high usability. A palm print refers to an image acquired of the palm region of the hand. The biometric use of palm prints uses ridge patterns to identify an individual. Palm print recognition system is most promising to recognize an individual based on statistical properties of palm print image. It is rich in its features: principal lines, wrinkles, ridges, singular points and minutiae points. This paper proposes a Biometric Palm print lines extraction using image processing morphological operation. The proposed work discusses the significance; since both the palm print and hand shape images are proposed to extract from the single hand image acquired from a sensor. The basic statistical properties can be computed and are useful for biometric recognition of individual. This result and analysis will result into Total Success Rate (TSR) of experiment is 100%. This paper discusses proposed work for biometric recognition of individual by using basic statistical properties of palm print image. The experiment is carried out by using MATLAB software image processing toolbox.

Бесплатно

Biometric system design for iris recognition using intelligent algorithms

Biometric system design for iris recognition using intelligent algorithms

Muthana H. Hamd, Samah K. Ahmed

Статья научная

An iris recognition system for identifying human identity using two feature extraction methods is proposed and implemented. The first approach is the Fourier descriptors, which is based on transforming the uniqueness iris texture to the frequency domain. The new frequency domain features could be represented in iris-signature graph. The low spectrums define the general description of iris pattern while the fine detail of iris is represented as high spectrum coefficients. The principle component analysis is used here to reduce the feature dimensionality as a second feature extraction and comparative method. The biometric system performance is evaluated by comparing the recognition results for fifty persons using the two methods. Three classifiers have been considered to evaluate the system performance for each approach separately. The classification results for Fourier descriptors on three classifiers satisfied 86% 94%, and 96%, versus 80%, 92%, and 94% for principle component analysis when Cosine, Euclidean, and Manhattan classifiers were applied respectively. These results approve that Fourier descriptors method as feature extractor has better accuracy rate than principle component analysis.

Бесплатно

Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

Krasimir Yankov Yordzhev

Статья научная

Some techniques for the use of bitwise operations are described in the article. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is defined. Each binary matrix is represented using ordered n-tuples of natural numbers. It is shown how by using the bitwise operations can be implemented an algorithm that gets canonical representatives which are extremal elements of equivalence classes relative to a double order on the set of considered objects.

Бесплатно

Blended Learning for Lifelong Learning: An Innovation for College Education Students

Blended Learning for Lifelong Learning: An Innovation for College Education Students

Ava Clare Marie O. Robles

Статья научная

With the fast developing and changing transport of technology, new trends and learning opportunities were ushered in the field of Education. This transformation restructures the teaching-learning operation. As a result, educators encounter different learning preferences of students due to the emerging learning needs brought by technology. Although many universities here and abroad recognize the potential of blended learning, there is still lack of implementation on how blended learning be planned, designed and applied. In response to this need, an empirical study on the use of blended learning approach was conducted, which involved the mixing of face-to-face and online delivery methods. Thus, the main purpose of this paper was to find out the effect of blended learning (BL) approach on the students' performance in education subjects. Additionally, this work presents instructional strategies on how to effectively integrate content, pedagogy and technology to enhance the teaching and learning of education courses. This provided the most effective and efficient learning experiences on both teachers and learners with its practical applications against retailed software which often burden many universities. Finally, some implications on how to effectively blend pedagogy and technology, which inevitably lead to significant enhancement of the curriculum, were also discussed.

Бесплатно

Blinds Children Education and Their Perceptions towards First Institute of Blinds in Pakistan

Blinds Children Education and Their Perceptions towards First Institute of Blinds in Pakistan

Tanzila SABA

Статья научная

This paper investigates the parental participation,their perceptions and opinions about the education of their visually handicapped children in the first institute for the blinds children in Multan Pakistan. Students with visual impairments have unique educational needs which could most effectively meet using a team approach of professionals,parents and students. In order to meet their unique needs,students must have specialized services, books and materials in appropriate media to enable them to most effectively compete with their peers in school and ultimately in society.This study examines the role of education imparted by the institute as felt by the parents of visually impaired children admitted at the institute for blinds.

Бесплатно

Blur Classification Using Wavelet Transform and Feed Forward Neural Network

Blur Classification Using Wavelet Transform and Feed Forward Neural Network

Shamik Tiwari, V. P. Shukla, S. R. Biradar, A. K. Singh

Статья научная

Image restoration deals with recovery of a sharp image from a blurred version. This approach can be defined as blind or non-blind based on the availability of blur parameters for deconvolution. In case of blind restoration of image, blur classification is extremely desirable before application of any blur parameters identification scheme. A novel approach for blur classification is presented in the paper. This work utilizes the appearance of blur patterns in frequency domain. These features are extracted in wavelet domain and a feed forward neural network is designed with these features. The simulation results illustrate the high efficiency of our algorithm.

Бесплатно

Bond Graph Modelling of a Rotary Inverted Pendulum on a Wheeled Cart

Bond Graph Modelling of a Rotary Inverted Pendulum on a Wheeled Cart

Jessica A. Onwuzuruike, Suleiman U. Hussein

Статья научная

There are some systems that are yet to be modelled using certain methods. One of them is Rotary Inverted Pendulum (RIP) on a wheeled cart which is yet to be modeled using the bond graph technique. Therefore, this work explored the bond graph technique for this system. Using this technique, which uses the concept of energy (power) transfer between elements in a system, the system was modeled. Then, the state space equations of the system, which give the first-order differential equations, were derived. It was observed that the system has five state variables because of the five integrally causal storage elements.

Бесплатно

Building Predictive Model by Using Data Mining and Feature Selection Techniques on Academic Dataset

Building Predictive Model by Using Data Mining and Feature Selection Techniques on Academic Dataset

Mukesh Kumar, Nidhi, Bhisham Sharma, Disha Handa

Статья научная

In the field of education, every institution stores a significant amount of data in digital form on the academic performance of students. If this data is correctly analysed to discover any pattern related to student learning, it can assist the institution in achieving a favorable outcome in the future. Because of this, the use of data mining techniques makes it much simpler to unearth previously concealed information or detect patterns in student data. We use a variety of data mining methods, such as Naive Bayes, Random Forest, Decision Tree, Multilayer Perceptron, and Decision Table, to predict the academic performance of individual students. In the real world, a dataset may contain many features, yet the mining process may only place significance on some of those aspects. The correlation attribute evaluator, the information gain attribute evaluator, and the gain ratio attribute evaluator are some of the feature selection methods that are used in data mining to remove features that are not important for the mining process. Other feature selection methods include the gain ratio attribute evaluator and the gain ratio attribute evaluator. In conclusion, each classification algorithm that is designed using some feature selection methods enhances the overall predictive performance of the algorithms, which in turn improves the performance of the algorithms overall.

Бесплатно

Building a Natural Disaster Management System based on Blogging Platforms

Building a Natural Disaster Management System based on Blogging Platforms

M.V.Sangameswar, M.Nagabhushana Rao, M.Shiva Kumar

Статья научная

Over the decades, numerous kinds of knowledge discovering and sharing of the data techniques are playing a major role to reach the information quickly. Among these since last few years, social networks or media and own blogging are playing a major in sharing the personal information, updating the status, tagging the location and many more features. These data are considered to examine and the acceptance for emergency services to respond with the information gathered from the social network. Taking this into the consideration, proposed an algorithm to find out the location of the person based upon the information shared. This is implemented on a most popular social media twitter to identify the tweets.

Бесплатно

Building an Ontology for the Metamodel ISO/IEC24744 using MDA Process

Building an Ontology for the Metamodel ISO/IEC24744 using MDA Process

Mehdi Mohamed Hamri, Sidi Mohamed Benslimane

Статья научная

The idea of using ontologies in the field of software engineering is not new. For more than 10 years, the Software Engineering community arouse great interest for this tool of semantic web, so to improve; their performance in production time and realisation complexity on the one hand, and software reliability and quality on the other hand. The standard ISO / IEC 24744, also known as the SEMDM (Software Engineering – Meta-model for Development Methodologies), provides in a global perspective, a conceptual framework to define any method of software development, through the integration of all methodological aspects related to the followed procedures, as well as, products, people and tools involved in the conception of a software product. The purpose of this article is to create domain ontology for ISO / IEC 24744 using an MDA process. This ontology will serve as semantic reference in order to assist for a better interoperability between the different users of the standard (human, software or machine).

Бесплатно

CHex: An Efficient RDF Storage and Indexing Scheme for Column-Oriented Databases

CHex: An Efficient RDF Storage and Indexing Scheme for Column-Oriented Databases

Xin Wang, Shuyi Wang, Pufeng Du, Zhiyong Feng

Статья научная

As increasingly large RDF data sets are being published on the Web, effcient RDF data management has become an essential factor in realizing the Semantic Web vision. However, most existing RDF storage schemes, which are built on top of row-store relational databases, are constrained in terms of efficiency and scalability. Still, the growing popularity of the RDF format used in real-world applications arguably calls for an effort to deal with these drawbacks. In this paper, we propose a novel RDF storage and indexing scheme, called CHex, which uses the triple nature of RDF as an asset to implement sextuple indexing for a column-oriented database system. Using binary association tables (BATs) in the column-oriented data model, RDF data is indexed in six possible ways, one for each possible ordering of the three RDF elements. The sextuple indexing scheme in a column-oriented database not only provides efficient single triple pattern lookups, but also allows fast merge-joins for any pair of two triple patterns. To evaluate the performance of our approach, we generate large-scale data sets upto 13 million triples, and devise benchmark queries that cover important RDF join patterns. The experimental results show that our approach outperforms the row-oriented database systems by upto an order of magnitude and is even competitive to the best state-of-the-art native RDF store.

Бесплатно

CIPP-SAW Application as an Evaluation Tool of E-Learning Effectiveness

CIPP-SAW Application as an Evaluation Tool of E-Learning Effectiveness

Dewa Gede Hendra Divayana, I Putu Wisna Ariawan, Made Kurnia Widiastuti Giri

Статья научная

The effectiveness level of e-learning implementation in the learning process at health colleges is very important for all users to know. Things that can be done to measure the level of effectiveness accurately is to carry out evaluation activities using computerized tools. One of the innovations found in this research was a computer-based evaluation application called the CIPP-SAW application. This application is formed by combining an educational evaluation model called CIPP (Context-Input-Process-Product) with a decision support system method called SAW (Simple Additive Weighting). Based on those situations, this research aimed to provide an overview of the user interface design and workings of the CIPP-SAW application used in evaluating the effectiveness of e-learning implemented in health colleges (case study in Bali province). This research was a development study using Borg & Gall’s design, which focused on the preliminary field test and main product revision stages. The subjects involved in the field trial of the CIPP-SAW application were 64 respondents. The respondents included: two informatics experts, two educational evaluation experts, 30 students, and 30 lecturers from several health colleges in Bali province. Data collection tools in the form of questionnaires, interview guidelines, and photo documentation. The analysis technique used was descriptive quantitative which compares the effectiveness level of the CIPP-SAW application with the effectiveness standard which refers to a scale of five. The results showed that the effectiveness level of the CIPP-SAW application was 87.521%, so it was in a good category.

Бесплатно

Canberra Match Normalization-Enhanced Decision Stump Classifier for Predicting Academic Performance in the Context of Smartphone Addiction

Canberra Match Normalization-Enhanced Decision Stump Classifier for Predicting Academic Performance in the Context of Smartphone Addiction

R. Ruth Belina, T. Lucia Agnes Beena, Charles Savarimuthu

Статья научная

Student academic performance (SAP) prediction is a key issue in education data analysis. Also, the assessment of students’ performance is used to enhance the efficiency of educational institutions. With the development in educational institutions and modern technology, focusing on the academic performance prediction of the student based on access to the smartphone is the need of the hour. To improve the accuracy of student academic performance prediction, the Canberra Match Normalization-based Generalized Canonical Correlative Decision Stump Classifier (CMN-GCCDSC) is introduced. Initially, student data are collected from the dataset. After the data collection process, the proposed CMN-GCCDSC technique is applied in two phases namely data preprocessing and classification respectively. In the first phase, data preprocessing is carried out to eliminate duplicate data using the Canberra Match Data Normalization technique to minimize space and time consumption. In the second phase, data classification is performed with preprocessed output to classify student academic performance using a generalized canonical correlative decision stump classifier based on Smartphone addiction prediction. The generalized canonical correlation analysis is used for decision-making. Based on analysis, student academic performance is classified and results are obtained. An experimental assessment of the proposed CMN-GCCDSC technique and existing methods is carried out with metrics such as accuracy, sensitivity, specificity, space complexity, and time complexity. The CMN-GCCDSC technique is an effective solution that addresses the limitations of Genetic Algorithm (GA)-based decision tree classifiers. By combining the Decision Stump Classifier (DSC) approach with Generalized Canonical Correlation (GCC), the most important feature to consider for academic prediction among students can be selected, ultimately reducing the dimensionality of the dataset, and improving classifier performance. With higher accuracy rates achieved, this technique can help identify at-risk students early and discover hidden trends and patterns in student performance, leading to improved academic outcomes with additional support from institutions and faculties.

Бесплатно

Categorization in Unsupervised Generative Self-learning Systems

Categorization in Unsupervised Generative Self-learning Systems

Serge Dolgikh

Статья научная

In this study the authors investigated the connections between the training processes of unsupervised neural network models with self-encoding and regeneration and the information structure in the representations created by such models. We propose theoretical arguments leading to conclusions, confirmed by previously published experimental results that unsupervised representations obtained under certain constraints in training compliant with Bayesian inference principle, favor configurations with better categorization of hidden concepts in the observable data. The results provide an important connection between training of unsupervised machine learning models and the structure of representations created by them and can be used in developing new methods and approaches in self-learning as well as provide insights into common principles underlying the emergence of intelligence in machine and biologic systems.

Бесплатно

Centralized education management information system for tracking student’s academic progress in Tanzanian secondary schools

Centralized education management information system for tracking student’s academic progress in Tanzanian secondary schools

Anold S. Nkata, Mussa A. Dida

Статья научная

Application of Education Management Information System for administering school academic activities is widely recognized as an essential tool of improving quality of education for sustainable development. However, in developing countries including Tanzania, most secondary schools use manual system for collecting, storing and disseminating education information. The Manual system limits schools to have accurately, timely and reliable dissemination of education information. Moreover, when parents want to monitor student’s academic progress, the manual system requires them to visit schools physically and sometimes to wait until the end of the terminal and annual examination to get student academic report. Social and economic activities are one of the factors which limit parents to monitor student’s academic progress effectively. Poor parental involvement for monitoring and tracking student’s academic progress leads to poor student academic achievement. To address the solution, the study used structured interview and questionnaires to collect data from secondary schools education stakeholder. The collected data was analyzed using Pandas Python data analysis package. Findings from the study revealed that, poor student academic achievement in Tanzanian secondary schools is being caused by poor parental involvement in monitoring and tracking student’s academic progress. However, the study developed and implemented a centralized Education Management Information System for enhancing parental involvement in monitoring and tracking student’s academic progress. The significance of this study was to enhance parental involvement for student academic achievement by improving delivery of quality education for sustainable development.

Бесплатно

Child based Level-Wise List Scheduling Algorithm

Child based Level-Wise List Scheduling Algorithm

Lokesh Kr. Arya, Amandeep Verma

Статья научная

Cloud is the Latest concept in IT. Users use the resources or services which are provided & managed by the service providers. Users need not to buy the hardware or software which now can be used on rental basis. Workflow represents the cloud application which has different tasks to be executed in an order. Scheduling algorithms are used to assign these tasks to processors and these algorithms decide the cost and time of execution. In this paper, a simple scheduling algorithm has been proposed named Child Based Level-Wise List Scheduling (CBLWLS) algorithm. According to the dependencies CBLWSL calculate priorities of tasks and finds the sequence of task execution and then maps the selected task to the available processors. We perform experiments on Epigenomics workflow structure graphs used in some real applications and their analysis shows that CBLWLS algorithm performed better than the HEFT (Heterogeneous Earliest Finish Time) algorithm, on the parameters of time of execution, execution cost and schedule length ratio.

Бесплатно

Classification Model of Prediction for Placement of Students

Classification Model of Prediction for Placement of Students

Ajay Kumar Pal, Saurabh Pal

Статья научная

Data mining methodology can analyze relevant information results and produce different perspectives to understand more about the students’ activities. When designing an educational environment, applying data mining techniques discovers useful information that can be used in formative evaluation to assist educators establish a pedagogical basis for taking important decisions. Mining in education environment is called Educational Data Mining. Educational Data Mining is concerned with developing new methods to discover knowledge from educational database and can used for decision making in educational system. In this study, we collected the student’s data that have different information about their previous and current academics records and then apply different classification algorithm using Data Mining tools (WEKA) for analysis the student’s academics performance for Training and placement. This study presents a proposed model based on classification approach to find an enhanced evaluation method for predicting the placement for students. This model can determine the relations between academic achievement of students and their placement in campus selection.

Бесплатно

Журнал