International Journal of Modern Education and Computer Science @ijmecs
Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1112

Favorable Trail Detection using ACO-Bellman Algorithm in VANETs
Статья научная
Vehicular ad hoc networks (VANETs) are the networks, which configured themselves, where the nodes are moving vehicles. These provide the communications required to deploy Intelligent Transportation Systems (ITS). A major dispute in VANETs is distribution of efficient and computable information because during communication nodes may leave or join the network dynamically. There is no guarantee about node availability at any given time, which leads to traffic problem, congestion problem. Therefore trailing the favorable path is a challengeable issue. Multiple routing algorithms have been developed for routing solution. In this paper the swarm-based algorithm has been presented, which helps to find out the optimal route using Bellman Ford algorithm. Ant colonization searches out the path using pheromones level. Higher the pheromone count of a route gives the optimal choice of path that can be used for packet delivery. Bellman Ford Algorithm optimizes the paths found by Ant Colony Optimization (ACO) by comparing the distance of source to all the nodes of network or cost given to the networks.
Бесплатно

Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques
Статья научная
The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such RIA applications have grown as well. Since manual code reviews are time-consuming, error prone and costly,the need for automated solutions has become evident.In this paper, we address the problem of vulnerable detection on Adobe Flex RIA web 2.0 applications by means of static source code analysis. To this end, we present a novel; precise alias analysis targeted at the unique reference semantics commonly found in RIA based web applications or widgets developed in Adobe Flex Framework or Action Script 3.0. Moreover, we enhance the quality and quantity of the generated vulnerability reports.
Бесплатно

Fixed Point Theorems for Occasionally Weakly Compatible Maps in G-Metric Space
Статья научная
The purpose of this paper is to prove new common fixed point theorem in Symmetric G-metric space. While proving our result, we utilize the idea of occasionally weakly compatible maps due to Al-Thagafi and N. Shahzad. Our result substantially generalize and improve a multitude of relevant common fixed point theorems of the existing literature in G- metric space.
Бесплатно

Focus Question based Inquiry Guided Learning for the Attainment of Course Learning Outcomes
Статья научная
Teaching and learning Methodologies in technical and engineering education has high impact on attainment of Graduate attributes. Studies have proved that class room teaching with mere usage of Black board (BB) and audio visual presentations doesn't effectively involve the student completely in learning. Also evaluation and assessment with midterm exams and end term exams may not give the complete picture of student learning progress. In fact in today's outcome based education the attainment of course learning outcomes require student centered teaching learning procedures and a continuous evaluation procedure. In this paper Focus question based Inquiry based learning an active teaching learning procedure also student centered is discussed. Also how this method is used for continuous assessment is also explained. It is successfully implemented to under graduate and post graduate students of Computer science and Information technology of engineering college, and the results are presented.
Бесплатно

Статья научная
As the English language and information and communication technology (ICT) enhance global interconnection, demands on educating the young generation with English language skills and technological competence increase exponentially. As the successor of education, pre-service English teachers need to be trained with technological pedagogical content knowledge (TPACK). This study aims to develop an instructional model oriented to pre-service English teachers' (PST) TPACK. This is design-based research carried out in three stages: informed exploration, enactment, and evaluation. This study employed a multiphase mixed method. A qualitative design was done in the informed exploration stage, and an explanatory sequential mixed design was used for the evaluation stage. Nine PSTs, three lecturers, and 4 experts were invited as the participants of this study. The qualitative data were analyzed thematically on NVIVO software while the quantitative data were analyzed using descriptive statistic calculation. The results showed that the PSTs need an instructional model that facilitates student agency, learning agency, self-reliance, innovation, and cooperation. An instructional model called Inquiry-based, technology-saturated, and flipped instructional model (INSTALL) was developed. The expert validation result showed that the products of this development study were in the “Very Good” category. The results of the expert judgment indicated that INSTALL could be utilized to enhance the PSTs’ TPACK by blending inquiry-based learning and technology-saturated flipped instruction.
Бесплатно

Foundations of Lexicographic Cooperative Game Theory
Статья научная
In the article dimensional lexicographic noncooperative games are defined for the players' for which there exists a characteristic function . Some main features are proved of function in a lexicographic case. A lexicographic cooperative game is called a couple, whereis a real vector-function on subsets and the following conditions are fulfilled =O; Such cooperative game is denoted by . imputation and its set is defined in game. It is proved that is nonempty and its full characterisation is given. Domination over set is defined. Thus, the main foundations are given, according to this, it is possible to explore the main principles of optimality.
Бесплатно

Framework for software code reviews and inspections in a classroom environment
Статья научная
Code reviews and inspections have the purpose to ensure that the code has sufficient quality to be released. It is generally seen as an economical way of finding errors, increase team productivity and sharing technical and product knowledge among team members. This approach is traditionally adopted in software development companies, but their practices may be useful in other contexts, such as in the process of learning software engineering. In this sense, this study proposes an innovative framework for conducting code reviews in a Computer Science course. The proposed framework can be applied in any object-oriented program language, and it is sufficiently concise to be applied in the classroom, namely in a 90-minute session in which all students are invited to collaborate in this process. The findings suggest that code reviews in an academic context can help students to strategically reflect about the performed work, enhance their soft skills, and increase their ability to work in groups. On the other hand, as the main challenges, the findings reveal that students typically don’t have previous experience in performing inspections and it can become difficult to perform a complete inspection in a classroom session.
Бесплатно

Free Open Source Software in Electronics Engineering Education: A Survey
Статья научная
Since the last two decades, much attention has been paid to Electronics Engineering (EE) education in India. Various commercial software tools and simulator such as mathematical application packages, electronics CAD tools, learning management systems, multimedia tools and general purpose tools supports EE education. Traditionally, proprietary software packages such as OrCAD Pspice, MATLAB, LabView, Multisim and others too are widely practiced and well integrated in electronics engineering curricula of various Universities nationwide. In today’s market, there are plenty of software tools and packages; however, most of them are expensive. The high cost of standard commercial packages is often hardship for students and faculties. Selecting various appropriate tools for academic use is considered as one of the key challenges in EE education. Over recent years, an alternative trend based on Free Open Source Software (FOSS) has gained momentum in higher education due to several benefits such as cost, license management flexibility, access to source code, security and stability etc. Presently, a plethora of open source software tools and resource related to EE can be deployed in teaching and learning process of EE education. In this communication, a short exposition of Free Open Source Software useful in electronics engineering education and research is presented. A brief outlook of FOSS packages, their web addresses and major highlights are also presented. The overall aim of this paper is to create awareness among instructors and students to impart active and self learning using FOSS.
Бесплатно

Статья научная
Clustering of educational data was performed in the space of two parameters using the K-Means method. Students who are characterized by grades in certain types of activities were used as objects of clustering. Software for fuzzy data clustering is implemented in the Python language in the Google Colab cloud service. The obtained clusters are described by fuzzy Gaussian membership functions, which allowed to reliably determine the membership of each object to a certain cluster, even if the clusters do not have clear boundaries. Due to clustering, the most important characteristics of the educational process for a certain task are obtained, that is, this is how Data Manning tasks are solved. Fuzzy membership functions implemented using the scikit-fuzzy library. The developed program can also be used for educational purposes, as it allows a better understanding of the principles of cluster analysis and fuzzy logic. The correctness of the work of the developed program was confirmed during the processing of test educational data. The determination of the number of clusters was performed by software, taking into account the intra-cluster and inter-cluster distances, as well as the shape of the clusters. Automated selection of the number of clusters and cluster boundaries allows to reduce data processing time. The developed clustering tools are designed to increase the efficiency of system analysis of quality education.
Бесплатно

Fuzzy Intelligent System for Student Software Project Evaluation
Статья научная
Developing software projects allows students to put knowledge into practice and gain teamwork skills. However, assessing student performance in project-oriented courses poses significant challenges, particularly as class sizes increase. This paper introduces a fuzzy intelligent system designed to evaluate academic software projects using an object-oriented programming and design course as an example. Our methodology involved conducting a survey of student project teams (n=31) and faculty (n=3) to identify key evaluation parameters and their applicable ranges. The critical criteria—clean code, use of inheritance, and functionality—were represented as fuzzy variables with corresponding fuzzy sets. We collaborated with three experts, including one professor and two course instructors, to define a set of fuzzy rules for a fuzzy inference system. This system processes the input criteria to produce a quantifiable measure of project success. Our fuzzy intelligent system demonstrated promising results in automating project evaluation, standardizing assessments, and reducing subjective bias in manual grading. The key findings show that the system effectively manages the increasing instructor workload, provides consistent and transparent evaluations, and offers timely and accurate feedback to students.
Бесплатно

Fuzzy Latent Semantic Query Expansion Model for Enhancing Information Retrieval
Статья научная
One natural and successful technique to have retrieved documents that is relevant to users' intention is by expanding the original query with other words that best capture the goal of users. However, no matter the means implored on the clustered document while expanding the user queries, only a concept driven document clustering technique has better capacity to spawn results with conceptual relevance to the users' goal. Therefore, this research extends the Concept Based Thesaurus Network document clustering techniques by using the Latent Semantic Analysis tool to identify the Best Fit Concept Based Document Cluster in the network. The Fuzzy Latent Semantic Query Expansion Model process achieved a better precision and recall rate values on experimentation and evaluations when compared with some existing information retrieval approaches.
Бесплатно

Fuzzy SLIQ Decision Tree Based on Classification Sensitivity
Статья научная
The determination of membership function is fairly critical to fuzzy decision tree induction. Unfortunately, generally used heuristics, such as SLIQ, show the pathological behavior of the attribute tests at split nodes inclining to select a crisp partition. Hence, for induction of binary fuzzy tree, this paper proposes a method depending on the sensitivity degree of attributes to all classes of training examples to determine the transition region of membership function. The method, properly using the pathological characteristic of common heuristics, overcomes drawbacks of G-FDT algorithm proposed by B. Chandra, and it well remedies defects brought on by the pathological behavior. Moreover, the sensitivity degree based algorithm outperforms G-FDT algorithm in respect to classification accuracy.
Бесплатно

Статья научная
Face Recognition has become the challenging and interesting research topic in the last few years. The aim is to design a robust Face Recognition System under different environmental conditions like illumination, pose and occlusion. These are the three major challenges in Face Recognition which may hinder the Face Recognition system. By combining the three successful representations such as Gabor filters, CS-LBP and TLPP better performance can be achieved as compared to just considering them individually. CS-LBP is used for describing interest regions which have good tolerance to illumination and computational efficiency and TLPP is used to take the data directly in the form of tensors as input. Since the number of the combined feature sets are more only a few feature sets is selected to be trained by the Support Vector Machine classifier. A number of experiments are conducted using YouTube celebrity, McGill Face dataset and as well as the own collected sequence under different conditions such as illumination variations, different poses, occlusion including indoor and outdoor scenes. This approach provides better results compared to traditional approaches.
Бесплатно

Статья научная
In the modern digital world, online shopping becomes essential in human lives. Online shopping stores like Amazon show up the "Frequently Bought Together" for their customers in their portal to increase sales. Discovering frequent patterns is a fundamental task in Data Mining that find the frequently bought items together. Many transactional data were collected every day, and finding frequent itemsets from the massive datasets using the classical algorithms requires more processing time and I/O cost. A GPU accelerated Novel algorithm for finding the frequent patterns using Vertical Data Format (GNVDF) has been introduced in this research article. It uses a novel pattern formation. In this, the candidate i-itemsets is divided into two buckets viz., Bucket-1 and Bucket-2. Bucket-1 contain all the possible items to form candidate-(i+1) itemsets. Bucket-2 has the items that cannot include in the candidate-(i+1) itemsets. It compactly employs a jagged array to minimize the memory requirement and remove common transactions among the frequent 1-itemsets. It also utilizes a vertical representation of data for efficiently extracting the frequent itemsets by scanning the database only once. Further, it is GPU-accelerated for speeding up the execution of the algorithm. The proposed algorithm was implemented with and without GPU usage and compared. The comparison result revealed that GNVDF with GPU acceleration is faster by 90 to 135 times than the method without GPU.
Бесплатно

GPU Optimized Stereo Image Matching Technique for Computer Vision Applications
Статья научная
In this paper, we propose a graphics processing unit (GPU) based matching technique to perform fast feature matching between different images. Lowe proposed a scale invariant feature transform algorithm that has been successfully used in various feature matching applications such as stereo vision, object recognition, and many others, but this algorithm is computationally intensive. In order to solve this problem, we propose a matching technique optimized for graphics processing units to perform computation with less time. We have applied GPU optimization for the fast computation of keypoints to make our system fast and efficient. The proposed method used self-organizing map feature matching technique to perform efficient matching between different images. The experiments are performed on various images to examine the performance of the system in diverse conditions such as image rotation, scaling, and blurring conditions. The experimental results reveal that the proposed algorithm outperforms the existing feature matching methods resulting into fast feature matching with the optimization of graphics processing unit.
Бесплатно

Game Theory - basis of Higher Education and Teaching Organization
Статья научная
The process of effective interrelation necessary for teaching the subject at higher school has been represented as a noncooperative game between the professor and the students. This process is the functioning of teaching of organizational system which comprises -pedagogue (professor) and -collective of students. The preference is given to the democratic model of relation - to objective and optimal mutual responsibility of the pedagogue and a student to the rights-obligations imposed on them. Two classes of models of noncooperatve games corresponding to management of system have been built - games with relations of preferences and the games with utility. The main principle of optimality is the Nash equilibrium, or it is such kind of situation, none of the player it is not profitable the unilateral deviation from it. According to the indicated principle of equilibrium the tasks originated in the process of system functioning has been solved. According to the solving results students must study systamatically do their tasks and teachers must be responsible objective for their work
Бесплатно

Gamification Approach in Teaching Web Programming Courses in PHP: Use of KAHOOT Application
Статья научная
Learning algorithmics and programming fundamental courses is widely considered to be quite challenging in the field of computer science. Gamification is a good alternative educational practice to promote programming teaching, it allows better engagement of students in their learning. Students acquire a reasonable level of abstraction and logic and develop reflections on various course concepts. They are better introduced to critical programming situations. In the present work, we investigated the impact of introducing simple gamified educational sequences within a dynamic programming PHP course on first year Master students in Educational Technology and Pedagogical Engineering (TEIP). Our use of gamification learning sequences based on the application KAHOOT in this course revealed a better engagement of students. 90% of the students in our experimental group expressed being more motivated and committed for the course and 87.5% of them expressed positive attitudes on using KAHOOT as a teaching tool. The majority (90%) expressed their intention to recommend KAHOOT to other teachers.
Бесплатно

Gender Differences on Information Literacy of Science and Engineering Undergraduates
Статья научная
Information literacy (IL) forms the basis of lifelong learning and plays very important role for students majoring in science and engineering. As far as higher education concerned, gender differences to may influence students’ academic achievements. In order to evaluate the gender differences on information literacy of undergraduates, we surveyed certain undergraduates using self-made questionnaire. The data of the survey was analyzed by SPSS. The findings of the study indicate that the gap of gender difference does exist in the sphere of information literacy. The result of t-test for two groups of male and female students shows significant difference in terms of mean scores obtained in information consciousness, information competency and information ethics tests.
Бесплатно

Gender Identification in Human Gait Using Neural Network
Статья научная
Biometrics is an advanced way of person recognition as it establishes more direct and explicit link with humans than passwords, since biometrics use measurable physiological and behavioural features of a person. In this paper gender recognition from human gait in image sequence have been successfully investigated. Silhouette of 15 males and 15 females from the database collected from CASIR site have been extracted. The computer vision based gender classification is then carried out on the basis of standard deviation, centre of mass and height from head to toe using Feed Forward Back Propagation Network with TRAINLM as training functions, LEARNGD as adaptation learning function and MSEREG as performance function. Experimental results demonstrate that the present gender recognition system achieve recognition performance of 93.4%, 94.6%, and 94.7% with 2 layers/20 neurons, 3 layers/30 neurons and 4 layers/30 neurons respectively. When the performance function is replaced with SSE the recognition performance is increased by 2%, 2.4% and 3% respectively for 2 layers/20 neurons, 3 layers/30 neurons and 4 layers/30 neurons.The above study indicates that Gait based gender recognition is one of the best reliable biometric technology that can be used to monitor people without their cooperation. Controlled environments such as banks, military installations and even airports need to quickly detect threats and provide differing levels of access to different user groups.
Бесплатно

Generating code for simple dynamic web applications via routing configurations
Статья научная
A dynamic web application tends to have many sorts of routine code which are essentially common in most dynamic web applications. By the routing for a web application we mean mapping URLs (requests) to actions (responses) of the application. In this paper, we show that by configuring the routing for a web application together with preparing static libraries and modifying dynamic templates to generate the modules which are needed by the application, we can generate most of the routine code necessary for the application. Configurations for the routing and other settings for an application are written uniformly in JSON format. Then, reading the JSON configurations our scripts set up static libraries and generate necessary modules from templates and write files which conduct the routing. Our system sets up everything you need to run a web application from the web directories for the application and the basic libraries to the modules for the application and the files for routing. You can add another web application to the web setting for the web application you have generated. To show by example the applicability of our web code generating system we first construct a book request page with a very little configuration on the application. Next as a more complicated example, we apply our system to a web application which involves a specific function i.e. reading a marksheet for which the system cannot generate code, showing how the system can generate a web application which utilizes the code not generated by the system.
Бесплатно