International Journal of Modern Education and Computer Science @ijmecs
Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1080

Статья научная
Online interactions provide a large knowledge exchange on variety kinds of information exchanged between users. There are many software systems available that provide online learning systems, this type of software expressed by forms, commercial or open source software. This paper is focused on Moodle, it explained the comparative study that done by many recent researches, it also shows the different between Moodle and other learning management systems, in order to discover their strengths and limitations, discusses different points in these systems. Moodle has been adopted by many universities and organizations the entire world because it offers a large accusable set of tools, and many components was developed without a specific design documentation including its security services. This paper shows the comparative study between Moodle and other e-learning systems; it aimed to discover the best and most suitable choice of e-learning system. We have fined the optimal e-learning platform required to our e-learning university system, and it is Moodle, according to the used by many Universities around the word and from many works that has been done to date that encourages the used and develops this type of LMS.
Бесплатно

Статья научная
This correlational study examined the effects of motivation in the process of learning and its connections to the academic achievement of the students who study at the Basic Arabic Schools in China. The designed tool, which is a questionnaire, consists of 40 items and had been processed by statistical analysis to contrived psychometric properties and it had been achieved through validity and reliability. The study acknowledged the cumulative scores of academic achievement of students for the last academic year, which was considered as one of the variables of the current study and compared to motivation to learn in the questionnaire sample of 30 students as well as the sample of the final study which covered all 242 students in the basic Arabic schools of the 7th, 8th and 9th Grades. The study found that there was a significant correlation between motivation to learn and academic achievement of students. It was proved through correlation and regression analysis that there was a positive relationship between motivation and academic achievement and the ability to predict the academic achievement through motivation. It had been found that the most motivated students are the ones who achieve higher academic performance. There were significant differences in motivation according to the gender in which females scored the highest means. Besides, no significant differences found in grade variables.
Бесплатно

Статья научная
In this study, we describe Information Systems students' decision making along their engagement with their final project regarding the complexity and innovations of their projects, and the technology they selected for the implementation. Data was gathered from projects' documentation; a questionnaire handed to the study participants, and from in-depth interviews conducted with representative group of them. Analysis of the data revealed that high achievers tend to develop innovative and complex final projects using major extensions of technologies learned in class while low achievers tend to develop simple and basic final projects using merely technologies learned in class or a minor extension of them. Surprisingly, some of the average and low achievers and none of the high achievers tended to use completely new technologies to gain relative advantage when applying for jobs, although this choice necessitated them to cope with large knowledge gaps.
Бесплатно

Статья научная
The VANETs carry many security concerns. One of the popular and dangerous attacks can be launched in the form of Sybil or Prankster attack, where an attacker inserts a fake position within in the cluster. The inserted fake node information can be utilized by the hackers in the case of selfish driver, traffic jams, selective collisions and other similar hazardous situations. To avoid such things the VANETs must be protected against such attacks. In this paper, a novel solution has been proposed to overcome the Sybil and prankster attacks on the VANETs. The new solution is capable of detecting the fake information injections by verifying the VANET node behaviour in the cluster. The behaviour of the node includes the direction, speed, pattern, etc. In case a node is found malicious, the whole cluster is reported against that node, and node is ordered to stop by the central control system. The proposed model has been developed using the random waypoint model. The random way point model is much closer to the real time VANETs. The random waypoint model has been compared against the reference point group model. The experimental results have shown the effectiveness of the proposed model.
Бесплатно

Статья научная
Today major section of automatic speaker verification (ASV) research is focused on multiple objectives like optimization of feature subset and minimization of Equal Error Rate (EER). As such, numerous systems for feature dimension reduction are proposed. This includes framework coaching and testing analysis for every feature set that could be a time esurient trip. Because of its significance, the issue of feature selection has been researched by numerous scientists. In this paper, a new feature subset selection procedure is presented. Hybrid of Ant Colony and Artificial Bee Colony optimized the feature subset over 85% thereby decreased the computational complexity of ASV. Additionally an external record is maintained to store non-dominated solution vectors for which concept of Pareto dominance is used. An overall optimization of 87% is achieved thereby improved the recognition rate of ASV.
Бесплатно

Multimodal biometric system based face-iris feature level fusion
Статья научная
This paper proposed feature level fusion technique to develop a robust multimodal human identification system. The humane face-iris traits are fused together to improve system accuracy in recognizing 40 persons taken from ORL and CASIA-V1 database. Also, low quality iris images of MMU-1 database are considered in this proposal for further test of recognition accuracy. The face-iris features are extracted using four comparative methods. The texture analysis methods like Gray Level Co-occurrence Matrix (GLCM) and Local Binary Pattern (LBP) are both gained 100% accuracy rate, while the Principle Component Analysis (PCA) and Fourier Descriptors (FDs) methods achieved 97.5% accuracy rate only.
Бесплатно

Nature-Inspired Swarm Intelligence and Its Applications
Статья научная
In 1989 Gerardo Beni and Jing Wang first proposed the name "Swarm Intelligence" in their paper "Swarm Intelligence in Cellular Robotic Systems". Some remarkable observations of different researchers are studied in this paper, like the proximity principle, the quality principle, the principle of diverse response, the principle of stability, the principle of adaptability. To enhance the capabilities of robot and different systems, researchers started to exploit the behavior of natural systems. Swarm groups are governed by three rules, move in the same direction as your neighbor, remain close to your neighbor, and avoid collision with your neighbor .Characteristics of swarm groups are emergence and stigmergy. Different insects like ants, wasps, termites carry out a work locally for global goal with sufficient flexibility as they are not controlled centrally. In this paper the existing research works are analysed to show the behavior in social insects by using self-organization, positive feedback, negative feedback, amplification of fluctuation, multiple interactions. It has also been observed that these insects are almost blind and memoryless, still they communicate indirectly among themselves for stigmergic effect by using pheromone. Implementation of swarm intelligence in robotics i.e., swarm robots are narrated. The limitations of swarm robots as well as factors behind the success of swarm robotics have also been encompassed. Finally authors focus on swarm robots applications in telecommunication fields, civil engineering and digital image processing.
Бесплатно

Networked Control System – A Survey
Статья научная
Networked Control System (NCS) is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy maintenance and high reliability. Networked control systems (NCSs) have been gaining popularity with their high potential in widespread applications and becoming realizable with the rapid developments in computer, communication and control technologies. This paper reviews the development history of the NCS, and point out the field of further researches.
Бесплатно

No-Reference JPEG image quality assessment based on Visual sensitivity
Статья научная
In this paper, a novel human visual sensitivity measurement approach is presented to assessment the visual quality of JPEG-coded images without reference image. The key features of human visual sensitivity (HVS) such as edge amplitude and length, background activity and luminance are extracted from sample images as input vectors. SVR-NN was used to search and approximate the functional relationship between HVS and mean opinion score (MOS). Then, the measuring of visual quality of JPEG-coded images was realized. Experimental results prove that it is easy to initialize the network structure and set parameters of SVR-NN. And the better generalization performance owned by SVR-NN can add the new features of the sample automatically. Compared with other image quality metrics, the experimental results of the proposed metric exhibit much higher correlation with perception character of HVS. And the role of HVS feature in image quality index is fully reflected.
Бесплатно

Novel Approach to Solve Resource Constrained Project Scheduling Problem (RCPSP)
Статья научная
In this paper, resource constrained project scheduling problem is taken and solved using genetic algorithm. This algorithm solves the problem as a whole in software development, with the limited resource the project has to be scheduled to the team members. The main aim is to schedule and optimize the resource to complete the project within time. Due to resource constraint environment, the complexity of solving the algorithm increases exponentially. So the traditional methods are not suitable to solve the resource constraint problem. The Genetic Algorithm is taken to solve the multiple resource constraints project scheduling needs. This typical NP-hard problem is solved via mathematical model via genetic algorithm. Software development projects were considered to be resource constrained and project scheduling solution makes the algorithm time efficient.
Бесплатно

Novel Digital Image Water Marking Technique Against Geometric Attacks
Статья научная
Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) based techniques have become prominently used in watermarking research. DCT based technique replacing the older ones have made digital watermarking based e-commerce a part of almost all business transactions. It is also being used in business communications and different solutions through computer network. DCT based technique is considered as a secured communication between two users. Verification is being provided for the origin of a watermark that traverses from sender to receiver. The cost per transmission has also reduced as the watermark is encoded in the digital watermarking itself. Here the key size is also small thus making it suitable for key exchange application. Also the security level in fragile watermark is better compared to discrete data integrity verification or authentication for the same bandwidth and key size In this paper, we have compared various geometric attacks based techniques in terms of PSNR and Attack Recovery time.
Бесплатно

Novel Framework for Automation Testing of Mobile Applications using Appium
Статья научная
Testing is an important phase in system development to improve the quality, reliability, and performance of software systems. As more and more mobile applications are developed, testing and quality assurance are vital to developing successful products. Users are widely opening browsers on mobiles to interact with web pages. It is important to ensure that our web application will be compatible with mobile browsers and applications. There is a need for a framework that can be applied to test different mobile browsers and applications. This paper proposes a novel framework for automation testing of mobile applications using Appium tool. The novel framework uses automation testing to reduce effort and speed up the process of automated testing on a mobile device. Survey is conducted to validate the proposed framework.
Бесплатно

Novel Reversible DS Gate for Reversible Logic Synthesis
Статья научная
Reversible logic has various applications in fields of computer graphics, optical information processing, quantum computing, DNA computing, ultra low power CMOS design and communication. As our day to day life is demanding more and more portable electronic devices, challenging focus on technology is demanding great system performance without any compromise in power consumption. It is obvious to find tradeoff between processing power and heat generation. As decreased processing speed leads to reduced power consumption but obviously compromise in performance is not acceptable for sophisticated applications. Thus power consumption is a prime target now days. Needless to say, researchers will now look at reversible logic in this vein. Primitive component of reversible logic synthesis are reversible logic gates .Thus it is very important for a new researcher to look into extensive literature survey of reversible logic gates. Many papers have been reported with review of reversible logic gates. This paper aims on updates in reversible logic gates and propose a novel reversible DS gate which will be stepping stone in design and synthesis of any complex reversible logic based synthesis.
Бесплатно

Статья научная
In general, the act of teaching in universities of the numerical methods of electromagnetic field simulation is a rather difficult action. In order to facilitate this act, it is necessary to use modern didactic means that complement the classical ones, so that the students understand in an interactive manner the method, the algorithm and its implementation into a programming language. This paper proposes a didactic method able to facilitate the understanding of numerical methods in electromagnetism. It's about of a didactic application with graphical interface, programmed using the Guide Matlab to simulate the electromagnetic waves propagation through various environments and applying the finite-difference time-domain method (FDTD).
Бесплатно

OCR for Printed Bangla Characters Using Neural Network
Статья научная
Optical Character recognition is a buzzword in the field of computing. Artificial neural networks are being used to recognize characters for a long time. ANN has the ability to learn and model non-linear and complex relationships, which is really important because in real life, many of the relationships between inputs and outputs are non-linear as well as complex. Research in the field of OCR with Bangla language is not as vast as the English language. So, there is a scope of research in this area. It can be used to search and scan hundreds of Bangla documents within seconds and can easily manipulate the data. It is developed for various purpose like for vision impaired person where OCR software can help turn books, magazines and other printed documents into accessible files that they can listen. The limitation of traditional OCR are sufficient dataset is not available, all different font of characters are not available and there are lots of complex and similar shape characters for which accuracy not good. In our research, we first tried to make a dataset large enough so that we can train our neural network as they require big data to train. We built our own dataset of 2,97,898 Bangla single character images of different fonts . Then for implementing neural network we used Scikit-learn’s multi-layer perceptron classifier and we also implemented our own multi-layer feed forward back propagation neural network using a machine learning framework named Tensorflow. We have also built a GUI application to demonstrate the recognition of Bangla single character images.
Бесплатно

Offline Handwritten Gurmukhi Numeral Recognition using Wavelet Transforms
Статья научная
This paper presents an OCR (optical character recognition) system for the handwritten Gurmukhi numerals. A lot of work has been done in recognition of characters and numerals of various languages like English, Chinese, and Arabic etc. But in case of handwritten Gurmukhi script very less work has been reported. Different Wavelet transforms are used in this work for feature extraction. Also zonal densities of different zones of an image have been used in the feature set. In this work, 100 samples of each numeral character have been used. The back propagation neural network has been used for classification. An average recognition accuracy of 88.83% has been achieved.
Бесплатно

On Computing the Edge-balanced Index Sets of the Circle Union Graph F (3, n)
Статья научная
On the basis of power-cycle nested network graph, the edge-balanced index sets of circle union graph F(3,n) graph were investigated. A new method of changing index is provided, simplifying the proving process. It reduced the difficulty of circle union graph F(3,n) graph labeling because of the novel design of the basic graph and single-point sector subgraph. The results show that the edge-balanced index sets of circle union graph F(3,n) graph. This paper has proved the existence of the edge-balanced index sets of one class of circle union graph, the computational formulas and the construction of the corresponding graphs are also provided.
Бесплатно

On Correlation of Р And NP Classes
Статья научная
It is shown an incorrectness of introduction of a class of NP-complete problems, which reason is that Cook’s S.А. theorem on that the “satisfiability” problem is the universal NP-complete problem, is not true and, therefore, the issue on existence of at least one NP-complete problem remains open, that explains failures of attempts to estimate correlations between P and NP classes.
Бесплатно

Статья научная
Universities in South Africa (SA) are facing several challenges due to the influx of students with diverse backgrounds entering the first year. One of such challenges is the use of technologies for teaching and learning. Institutions in the rural areas are flooded with first year students characterized as under-prepared, educationally underprivileged and had little or no access to computer usage prior to their enrolment. These qualities impedes their transition into the computer-based learning system and other technologies that supports teaching and learning. Moreover, the students are not given the needed assistance when enrolled. Orientation programme that would have been a leverage is only informative and not supportive in nature. Thus, an effective solution requires orientation programme to be supportive. It should involve assessing students' profile during their first year registration to provide them with the needed assistance in terms of technologies usage. This paper conducted a pilot survey over a sample of first year entering students in the University of Venda (UNIVEN). The objective was to assess students in terms of technology-related uses, expectations, experiences, skill levels and training needs. Data collected were analyzed and the results show students' have not used computers or had experience on technologies for teaching and learning in their previous schools. Additionally, students are only technologically identified with their mobile phones. The study proposed a new programme called First Experience Computer Literacy (FECOL) to facilitate students' transition into the computer-based learning of the university.
Бесплатно

On the Edge-balanced Index Set of a class of Power-cycle Nested Network Graph
Статья научная
Based on the research of Power-cycle Nested Graph blob.png, the decomposition method of single point sector has come up. By the use of the process of clawed nested-cycle sub-graph, the edge-balanced index sets of the power-cycle nested graph blob.png are solved when m ≥4 and m=4(mod5) . Besides, the constructive proofs of the computational formulas are also completed. The theory can be applied to information engineering, communication networks, computer science, economic management, medicine, etc. The proving method can be a reference to solve the problem of the power-cycle nested graph blob.png.
Бесплатно