Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1064
Measures for the Ontological Relations in Enterprise
Статья научная
In order to improve a system performance, it is significant to estimate the exchange rate of relationships between components of the system, in particular when the considered system is production or service companies. Indeed, bad and inappropriate relationships can generate dysfunctions, slowdowns or, more generally, loss of performance in enterprise leading to a decline in growth and competitiveness. Because of the heterogeneity of information and data, it is necessary to modeling relationships and ontologies are currently among the most evoked models in knowledge engineering. The aim is to define structured vocabularies, bringing together useful concepts of a domain and their relationships thus serving to organize, exchange information in an unambiguous way. Ontologies are widely applied to ensure semantic interoperability describing the enterprise structure and the exchange rate of existing relationships can be valued through their degree of effectiveness. This paper presents measures for the ontological relations in the enterprise. Our approach aims first to extract the set of relationships from an ontology previously created, then classify these relations, according to two types giving a weighting to calculate their degree of effectiveness. The implementation process is proposed on the local enterprise of steel wire drawing processing, giving degree of effectiveness for existing relationships. A sensitivity analysis is done to compare and interpret the different results.
Бесплатно
Measuring of Software Maintainability Using Adaptive Fuzzy Neural Network
Статья научная
Software maintenance mainly refers to the process of correcting software after delivery. Maintenance process is usually a high percentage of Organizational effort to the whole process of software programs. As a result, the effectiveness of the entire production process and customer satisfaction is dependent on the effectiveness of maintenance activities. Because many factors including type of service, type of product and human factors is dependent on the maintenance process, And the imprecise nature of qualitative factors and sub-criteria leading software maintenance, accurate assessment can be maintained in order to measure the effectiveness of programs seem highly desirable. In this paper, using adaptive fuzzy neural network to provide a method for evaluating the capability of software maintenance conducted after the tests, the root mean square error of the proposed method was equal to 0.34331. The results show that the method is based on adaptive fuzzy neural, maintainability software performance evaluation is appropriate.
Бесплатно
Measuring the Performance of e-Primary School Systems in Bangladesh
Статья научная
The government of Bangladesh (GoB) recently have introduced the concept of Digital Bangladesh. Education is one of the most vital sectors to make the digital nation. For that reason, the GoB has started to convert primary to e-primary schools. The main objective of this study is to investigate the current Information and Communication Technology (ICT) implementation status in e-primary schools by the GoB. The study is quantitative in nature. The study also develops an ICT implementation status model from the e-primary school systems in Bangladesh. This model has identified the ICT equipment, analyzed the ICT support & equipment, given weighted to each factor and investigated the current state of ICT implementation of e-primary schools in Bangladesh. The study has taken 800 sample schools from 8 divisions to investigate the current ICT implementation status. The study suggested that before implementing the ICT they will make sure all the infrastructure of ICT is available in those primary schools.
Бесплатно
Medical Students Dynamic Effort on Understanding of RNAi Therapeutic Application in Sri Lanka
Статья научная
This study examines students' understanding of the normative connections between key concepts of genetics, and RNAi and underlying biological principles that are critical for an in-depth understanding of RNAi therapeutic application on Medical field. Using a structural questionnaire, we examine randomly selected Medical faculty students' understanding of genetic relationships at Faculty of Medicine and Allied Sciences, University of Rajarata, Sri Lanka. A total of 80 Medical faculty students participated in this study and completed written questionnaire on genetics and RNAi therapeutic application. Findings from this study were there is a strong positive response on basic genetics studies in this content, but when it considers knowledge on RNAi and new technology based on RNAi therapeutic application is poorly understood. Almost all the students had a good knowledge on DNA but not the relationship between gene and DNA. Specifically, students were requested to demonstrate an integrated understanding of the RNAi therapeutic application, almost 96% of them unable to give an example for it, and also some students struggled to explain it. Outcome of this study is preliminary in nature; the results provide a glimpse of genetics education in Sri Lanka need to uplift.
Бесплатно
Meta-analysis of systematic literature review methods
Статья научная
Plenty data are generated each second under different locations and ways. In return, several valuable data are not used due to neglect or a wrong criteria selec-tion, affecting the results. To have the accurate decision the exact information is needed. But, in case of lack of data, an overall vision about all existing findings make a big difference especially in Medicine. The approach of Systematic Literature Review give the possibility to have this clear vision related to a specific topic, for the right input. We aim to identify all important steps to conduct a high quality of systematic literature review, independently of research domain. We first explain the reason behind our research and the significance of Systematic Literature Review in research fields, one of the way for minimizing the loss of infor-mation. Since our goal is to have an explicit methodolo-gy, we select several papers mentioning the procedure in different years to have a general view. Subsequently, we explain the approaches used to select the key steps to follow for selected articles. We settle this study with a complete step resuming all finding key phases. This research highlight also the im-portance of the use of an explicit methodology to vanish any misunderstanding or ignoring basic points to accom-plish a valuable and high quality work. This paper make a clear complete methodology to fol-low, in any domain and specially medicine, to conduct a best quality of Systematic Literature Review and reach the right gain using best practices.
Бесплатно
Methods of processing context in intelligent systems
Статья научная
Context-based methods represent an important part of toolkit used to build intelligent systems. In the article existent definitions of context for a system with a single decision making agent were discussed. Available formal models for context data representation and processing were compared. The approaches for different forms of reasoning within context were analyzed. Also the application of context awareness in systems with situation awareness is discussed. In the article unresolved problems and tasks in the domain of context aware computing are delineated.
Бесплатно
MiMaLo: Advanced Normalization Method for Mobile Malware Detection
Статья научная
A range of research procedures have been executed to overcome malware attacks. This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. This research used data mining classification approach method and validates it using ten fold cross validation. MiMaLo is a method to normalize a dataset the usage of the min-max aggregate and logarithm function. The application of the MiMaLo method aims to increase the accuracy value. Derived from the experiments, the classifiers overall performance level used to be extensively increasing. The application of the MiMaLo method using the neural network algorithm produces an accuracy of 93.54% with AUC of 0.982.
Бесплатно
Mining the dark web: a novel approach for placing a dark website under investigation
Статья научная
In the last two decades, illicit activities have dramatically increased on the Dark Web. Every year, Dark Web witnesses establishing new markets, in which administrators, vendors, and consumers aim to illegal acquisition and consumption. On the other hand, this rapid growth makes it quite difficult for law and security agencies to detect and investigate all those activities with manual analyses. In this paper, we introduce our approach of utilizing data mining techniques to produce useful patterns from a dark web market contents. We start from a brief description of the methodology on which the research stands, then we present the system modules that perform three basic missions: crawling and extracting the entire market data, data pre-processing, and data mining. The data mining methods include generating Association Rules from products’ titles, and from the generated rules, we infer conceptual compositions vendors use when promoting their products. Clustering is the second mining aspect, where the system clusters vendors and products. From the generated clusters, we discuss the common characteristics among clustered objects, find the Top Vendors, and analyze products promoted by the latter, in addition to the most viewed and sold items on the market. Overall, this approach helps in placing a dark website under investigation.
Бесплатно
Статья научная
Data transfer over the Internet comes with its range of challenges and associated prospects as a major milestone in the convergence of information and communication technology (ICT). Campus network implemented on IP-telephony defines a range of convergence technologies and applications that refers to a multi-service network that allows integration of data, audio, voice, and video solutions onto a converged infrastructure so that data can be transported via the use of open-source applications, protocols, hardware, and software. The study adopts the Federal College of Education Technical Asaba. It is observed that some issues in its implementation include packet loss, jitters, and latency. Jitters and packet loss can be curbed via an increased bandwidth allocation; while latency is minimized via constant upgrade in network infrastructure to increase speed. Overall, the proposed network seeks to provide its users with mobility, resilience, economy, flexibility, and productivity. Its results recommends that organizations wishing to harness its potentials should join forums and user-groups that will constantly update their knowledge in a bid to help them improve the efficiency and effectiveness of their infrastructure implementation.
Бесплатно
Mobile Communication Evolution
Статья научная
Presently, there is a wide establishment of mobile computing across the globe and the number of subscribers worldwide including Nigeria is on the increase every day. It started with mobile voice communication and has gradually been extended to the capability of sending and receiving data across the cellular networks. Also, the coming of this technology has changed the face of business all over the world and will soon dominate all strata of the society. Therefore, this paper is looking at the past, present and the future of this technology, the areas of applications and vectors of mobility that are likely to shape the future of the technology. The reviews of the mobile computing technology from the First generation (1G) to fourth (4G) are presented. The relationships of the generations were presented. The issues relating to the emergence of new technology are also reviewed. The interworking of the technologies and how they helped in promoting the mobile technologies were also reviewed. The deployments issues from First generation (1G) to 3G and later to 4G are presented. The paper has reviewed how each of the technology came to being and thus served as an eye opener to those people that are not acquainted with these technologies.
Бесплатно
Mobile Robot Motion Using Cellular Automaton Model to Avoid Transient Obstacles
Статья научная
The obstacle avoidance is currently treated by methods that fall into two broad categories: global and local approach. This paper considers the obstacles whose velocity and direction cannot be easily predicted. Such obstacle is called transient obstacle. To avoid such kind of obstacle, we introduce a local path planning method for a robotics by using cellular automaton approach. The cellular automaton was combined with Dijkstra shortest path algorithm as global path planning to obtain a path for mobile robot to be able to avoid transient obstacle along the path. Using the proposed method, a scene in a typical corridor has been created. Moreover, this paper also evaluated two kinds of obstacle avoidance motion. First, the robot uses the “stop and go” method, which is the robot decreases its speed while encounter a transient obstacle. The second one is detour method, in which the robot makes a detour motion to avoid a transient obstacle. To coupe the drawbacks of local path planning, this paper also propose the enhancement of detour method. The simulation results show that in dynamic environment with transient obstacles, the “stop and go” method produces minimal collision with shortest-distance path. While, using the detour method generates minimal collision with time-minimal navigation path.
Бесплатно
Статья научная
The proton exchange membrane fuel cell is an example of clean energy. Recently, a three-dimensional, steady-state non-isotherm mathematical model for proton exchange membrane fuel cell was developed for further exploration. This 3D model simultaneously takes into account the mass, momentum, energy, species, charge conservation equation as well as combines electrochemistry reaction inside the fuel cell. The simulation results reveals that it is easy to improve the fuel cell performance for higher porosity in the diffusion layer by speeding up the gas diffusion, reducing the concentration grads of gas, depressing the ridge board domino effect and falling current density grads.
Бесплатно
Model for Targeting Customers Based on Analytics in Telecom Domain
Статья научная
Big data has emerged as an important paradigm for analyzing and predicting customer's behavior. Based on the customer's behavior various campaigns are made to target them. This paper presents a model for telecom companies which will insist them in how to target customers based on analyses of their data collected. Proposed model gathers information from various customers through preconfigured devices and then it manages and provides required insights to telecom companies on basis of which they can target customers of particular segment. Its feedback model in which companies can change their campaign strategy according to the response they receive in real time.
Бесплатно
Model of e-Learning Acceptance and Use for Teaching Staff in Higher Education Institutions
Статья научная
We live in a world where we are exposed to everyday changes that information and communication technologies (ICT) give us impose. These changes are largely related to education, and so the introduction of ICT in universities as institutions of higher education, clearly changing the way it is implemented. The policy of "Goce Delcev" University (UGD) is to fully implement ICT in all segments of management, administration and teaching. For this purpose, several projects for e-learning implementation at UGD have been conducted. But, as much as important introduction is, the more important is the acceptance of new technologies in education. Therefore, we shall use a modified Unified Theory of Acceptance and Use of Technology (UTAUT) as the research methodology. The purpose of this paper is understanding teaching staff acceptance and use e-Learning system (ELC) and investigating the influence of seven determinants (four UTAUT determinants, 2 additional determinants and one personal "self-confidence" determinant). A survey was administered to 92 respondents (teaching staff) to capture their perceptions of e-learning. The findings of this research show that among the seven UTAUT factors, the effort expectancy and facilitating conditions have the strongest effect of intention to use new technology. Also according to the survey, social influence and facilitating conditions are in strongest correlation with the behavioral intention and thereby the most influence on the behavior of participants for acceptance and use of the e – learning system.
Бесплатно
Modeling Interaction in the Educational Process is a Tool for Improving its Effectiveness
Статья научная
In the context of growing and widespread demand for higher professional education, an important aspect is the quality of the educational process and the effectiveness of its results. The educational process is a complex socio-economic phenomenon involving at least two parties – the teacher and the students. It is these subjects of the process that are the key elements and interact, as a result of which there is an increase in the amount of information that is transformed into a competency-based form. It is the acquisition by students of the competencies they need in their professional activities that is the goal of the educational process. As a result of the study, it was found that it is possible to optimize the educational process and fill it with the necessary educational elements through fuzzy modeling of the transmission and perception of educational information. The article proposes a model of fuzzy interaction between a teacher and a student group. The model is designed to determine the possibilities of optimizing the educational process and the optimal combination of educational elements. Educational elements include teaching materials, communication tools, and digital technologies. With the help of these elements and the pedagogical strategy, the transfer of educational information to students is carried out. The same means and motivation are used for the perception of educational information. It is important to find the optimal combination of educational elements and tools that contribute to the effective transfer and assimilation of educational information. Improving the effectiveness of interaction between teachers and students affects the quality of education. The quality of the educational process determines the level of students' training, the success of graduates' professional activities, and the professional self-realization of teachers. The interaction model makes it possible to improve the quality of the educational process. This is confirmed by the results of its application at Tver State Technical University.
Бесплатно
Статья научная
The article is dedicated to solving the problem of modeling and developing a computer simulator with the creation of working scenarios for training operating personnel in object detection. The analysis of the features of human operator activity is carried out, the model of his behavior is described, and it is shown that for the presented task, the following three levels must be taken into account: behavior based on abilities (skills), behavior based on rules, behavior based on knowledge. User models that are used in man-machine systems were created, and their use in the process of modeling operator activity from the point of view of regular and irregular exposure was shown. This made it possible to create a prototype of a graphical window using a user-friendly interface. A system model of human-machine interface for processing and recognition of visual information is mathematically described and a model of image representation based on three possible scenarios of their formation is formed. The result of the study was the software implementation of an effective educational tool prototype that accurately replicates real-world conditions for the formation of working scenarios. The conducted experimental research showed the possibility of general image recognition tests, selection of different test modes, and support for arbitrary sets of image test tasks. Further research will be aimed at expanding the functionality of the created prototype, developing additional modules, automatically generating scenarios and verifying work.
Бесплатно
Modeling and Predicting Students' Academic Performance Using Data Mining Techniques
Статья научная
The main objective of this study is to apply data mining techniques to predict and analyze students' academic performance based on their academic record and forum participation. Educational Data Mining (EDM) is an emerging tool for academic intervention. The educational institutions can use EDU for extensive analysis of students' characteristics. In this study, we have collected students' data from two undergraduate courses. Three different data mining classification algorithms (Naïve Bayes, Neural Network, and Decision Tree) were used on the dataset. The prediction performance of three classifiers are measured and compared. It was observed that Naïve Bayes classifier outperforms other two classifiers by achieving overall prediction accuracy of 86%. This study will help teachers to improve student academic performance.
Бесплатно
Modeling and Recognition of Software Applications using FSM
Статья научная
Finite State Machines (FSMs) are mathemati-cal abstractions which have a rich use in computer appli-cations. If we build a FSM for software, then it becomes much easier and simpler to understand, debug and modify. The insights developed in FSMs have had great influence on various domains. FSM is as important as any other computer science tool. This paper minimizes the gap which currently exists between software development and the formal method of theoretical com-puter science. So importance of FSMs has been explored over various such domains in this article. These domains include spoken web technology that enables a user to access a massive network of voice sites through speech. Information transfer protocol for Vehicular Computing is another domain, where users can get on road support services using vehicular sensors and global position system. Adding on to the domain list, we have modeled FSMs for Ankle Monitor and Sensor Dust which are applications of mobile ad-hoc networks. Ankle monitor is primarily used to track movements of an individual through wireless communication and Sensor Dusts are tiny sensors which monitor the environment in which they are deployed. We have also modeled Palm Operating System, which is a mobile OS that runs on Linux kernel. This paper presents the FSM for the booting sequence and the user interface of Palm OS. To conclude with we have taken up the domain of satellite simulation and have presented a FSM for the steps involved in Satellite launching and Image Handling within a satellite. Therefore, by modeling a range of applications using FSM we attempt to add-on to the significance of this concept and at the same time provide a single document comprising numerous FSM models. This concept can be used by software developers for easy modeling of their designs and can further use it to verify and debug the model whenever required.
Бесплатно
Modeling of Haze Image as Ill-Posed Inverse Problem & its Solution
Статья научная
Visibility Improvement is a great challenge in early vision. Numerous methods have been experimented. As the subject is random and different significant parameters are involved to improve the vision, it becomes difficult, sometimes unsolvable. In the process original image has to be retrieved back from a degraded version of the image which is often difficult to perceive. Thus the problem becomes ill-posed Inverse Problem. This has been observed that VI (Visibility Improvement) is associated with haze and blur. This complex nature requires probability distribution, estimation, airlight calculation etc. In this paper a combination of haze and blur model has been proposed with detail discussions.
Бесплатно
Modeling the effect of network access control and sensor random distribution on worm propagation
Статья научная
Sensor networks are appealing targets for malicious attacks that invade the network with the aim of depleting the confidentiality, availability and integrity (CIA) features/parameters of neighboring sensor nodes. This is due to its open communication, minimal resources and its deployment in un-trusted, unguarded and unfriendly terrains. To restrict illegitimate users or malicious attackers (such as worms) network analysts have suggested network access control (NAC). Specifically, we apply NAC to wireless sensor network epidemic models in order to investigate distribution density, transmission range and sensor area/field. Our analyses involved analytical expressions of two sensor fields gleaned from literature. Additionally, we explored the possibilities of infectivity of sensor nodes at the exposed class using the two expressions for sensor field topologies. We also derived the reproduction ratios and solutions at several equilibrium points for the models. It is our hope that that our work herein would impact sensor deployment decisions for organizations that utilize wireless sensor networks for meaningful daily activities.
Бесплатно