Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1064
Proposed Automated Framework to Select Suitable Design Pattern
Статья научная
Many design patterns are available in the existing literature. Due to the availability of the enormous quantity of design patterns, it is extremely hard for a developer to find the suitable design pattern to address the problem. An experienced developer can even face problem to select the appropriate pattern for a specific problem and it is no man's land for junior developers. This paper proposes a novel framework that will generate problem-related questions to a developer to find suitable design pattern using a repository. The answers to these questions can guide developers to select the suitable design patterns. This paper uses the questionnaire as a data collection instrument to conclude the results. The results are found supportive indicating that the proposed framework will solve the problem in hand.
Бесплатно
Proposed framework to manage software requirements and reuse
Статья научная
Requirement elicitation and analysis form the focal point in the initial stages of the software development process. Unfortunately, in many software development projects, developers and end-users speak different languages. On one hand, end-users prefer to use natural languages while software developers who are technically perceptive, tend to use conceptual models. This difference in technical knowledge creates a communication gap, a potential cause of poor quality software products or project conflicts. The aim of this paper is to investigate the feasibility of a novel technique that seeks to foster effective elicitation of software requirements and support the implementation of structures that match particular requirements. By combining requirement elicitation and re-usable parts, the proposed solution envisages improvements in the overall software design process leading to enhanced requirement specifications. The novel idea is to incorporate an intermediate step for mapping Unified Modeling Language (UML) to Web Ontology Language (OWL) to enable the addition of ontology languages. The proposed model is validated through a survey. The validation results show that the proposed solution allows software developers to elicit software requirements and implement structures that match certain requirements.
Бесплатно
Provisioning Remote Lab Support for IT Programs in Distance Education
Статья научная
In the recent past Internet has become the de-facto communication network. It is being prominently used by Telecommunication, Television and other such networks as a carrier network. The current Internet technology has matured enough to support both Non-Real Time and Real-Time Streaming applications. Recently, even the speed of the access network through which an end user accesses the Internet has also increased substantially. All these have given way to newer Applications for being ported on to the Internet. A similar attempt has been made here to extend the Networking Lab infrastructure to students who have enrolled for their higher education through Distance mode. These students who are spread across the country are able to access the Network Lab to perform their Lab Exercises Live on Network devices as part of their Practical Course.
Бесплатно
Proximity Measurement Technique for Gene Expression Data
Статья научная
Data Mining is an analytical process intended to explore the data in search of consistent patterns. Due to its wide spread applications in biomedical industry and publicly available genomic data, data mining has become upcoming topic in the analysis of gene expression data. Clustering is the first step in understanding the complicated biological systems. The objective of clustering is to organize the samples into intrinsic clusters such that samples with high similarity belong to same cluster. The significance of clustering gene profiles is two-fold. Firstly, it assists in diagnosis of the disease condition and secondly it discloses the effect of certain treatment on genes. In this paper, we propose a new method to cluster gene expression data that is solely based on the concept of hierarchical clustering with a different method to compute the similarity between datasets and merge the pairs. The experimental results on two microarray data show the correctness and competence of proposed technique.
Бесплатно
Psychometric Analysis Using Computational Intelligence for Smart Choices
Статья научная
Currently with world's industries providing endless job varieties, it is getting difficult for the students to choose optimum career lines. Ranging from 16-24 years old, these age groups find themselves unable to recognize their future endeavors. Hence, psychometric tests provide a solution, helping them to recognize their interests, aptitude and personality traits to produce better results. The research process was facilitated by questionnaires involving verbal, spatial, logical, critical and numerical aptitude. The responses were analyzed using statistical techniques, and machine learning algorithms. A number of graphs were plotted for better understanding of the technical details. The proposed psychometric and aptitude analysis model entails accuracy calculation assigning K-means, KNN, confusion matrices and SVM plots. The results of the psychometric analysis gave broad spectra of career choices by studying the pattern of the choices selected by the people. Respondents were supposed to give information about their interests and perceptions in their day to day activities, which in turn reflect information about their inner humanly traits, unknowingly providing an ideal career path.
Бесплатно
Quality Implication for Prognoses Success in Web Applications
Статья научная
Massive increase in usage of World Wide Web makes it affective in every domain of life. Billions of people from different corners of world use internet for diverse purposes on daily bases. Quality acts as important key factor for web applications. Various methodologies have been proposed and many techniques have been deployed but, quality still lags behind. Our study in-focuses a detailed survey based on methodologies, metrics and architecture that are used in modeling of web application. We carried out analysis and comparisons between techniques and evaluate major quality characteristics. Study at conclusion illustrates that beside functional requirements, non-functional requirements are also essential and acts as backbone for quality in web based applications.
Бесплатно
Статья научная
The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.
Бесплатно
Question Answering for Collaborative Learning with Answer Quality Predictor
Статья научная
The increasing advances of Internet Technologies in all application domains have changed life styles and interactions. With the rapid development of E-Learning, collaborative learning is an important for teaching, learning methods and strategies. Studies over the years shown that students had actively and more interactively involved in a classroom discussion to gain their knowledge. Students can ask their questions to the classroom discussion when they want to collaborate with others, asking one another for information, evaluating one another’s ideas. Therein, the activity allowing one question has many answer or information that should be selected. Every answer has a weighting and its very subjective to select it. In this paper, we introduce question answering for collaborative learning with answer quality predictor. By using answer quality predictor the quality of the information could be determined. Through the process of collaborative learning, the knowledge base will be enriched for future question answering. Further, not only the student could get answers form others but also provided by the system.
Бесплатно
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
Статья научная
Medical Image Watermarking has been considered as an appropriate method for enhancing the data security and content verification in medical science. For the purpose of achieving better security it is recommended to hide the data in the medical image itself that will improve the reliability of medical information system. In our paper, the work is divided in two main stages, first of all image is divided into two parts: Region of Interest that is defined as informational part of image and Region of Non Interest that is defined as non-informational part. In our work we have used Region of Non Interest to hide the data so that the informational part of the image kept safe. Watermark is encrypted by using RSA. A Discrete Wavelet Transform based approach is used for embedding the encrypted data in Region of Non Interest part of image for enhancing data security. The experimental result shows that watermark embedded by the proposed algorithm provides better security and can survive successfully under different attacks.
Бесплатно
Статья научная
Meditation refers to a family of self-regulation practices that focus on training attention and awareness in order to bring mental processes under greater voluntary control. The aim of this study is to evaluate the efficiency of two different classifiers, k-Nearest Neighbor (k-NN) and Radial Basis Function (RBF), on the heart rate signals in a specific psychological state. For this purpose, two types of heart rate time series (before, and during meditation) of 25 healthy women are collected in the meditation clinic in Mashhad. The spectral parameters are used to gain insight into the autonomic nervous system (ANS) response induced by meditation. Therefore, very low frequency, low frequency, high frequency, the LF/HF ratio and frequency of the highest spectral peak of heart rate signals are extracted and used as inputs of the classifiers. To evaluate performance of the classifiers, the classification accuracies and mean square error (MSE) of the classifiers were examined. The classification results of this study denote that the RBF classifier trained on spectral features obtains higher accuracy than that of k-NN classifier. The total classification accuracy of the RBF classifier is 92.3% with 0.026 classification error. However, k-Nearest Neighbor classifier gives encouraging results (86.5%). Experimental results verify that radial basis function is an efficient classifier for classifying heart rate signals in a specific psychological state.
Бесплатно
Rainfall Forecasting to Recommend Crops Varieties Using Moving Average and Naive Bayes Methods
Статья научная
Indonesia has been known as an agrarian country because of its fertile soil and is very suitable for agricultural land, including rice. Yogyakarta is one of the most significant granary regions in Indonesia, especially in the Sleman region. However, one of the main challenges in rice planting in recent years is the erratic rainfall patterns caused by climate anomalies due to the El Nino and La Nina phenomena. As a result of this phenomenon, farmers have difficulty determining planting time and harvest time and planting other plants. Therefore, we make rainfall predictions to recommend planting varieties with Moving Average and Naive Bayes Methods in Sleman District. The results showed that moving averages well use in predicting rainfall. From these results, we can estimate that in 2020 rice production will below. That can saw from the calculation of the probability of naive Bayes on rice plants being low at 0.999 and 0.923. So that the recommended intercrops planted in 2020 are corn and peanuts. We also find that rainfall prediction with Moving Average using data from several previous years in the same month is more accurate than using data from four past months or periods.
Бесплатно
Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding
Статья научная
Due to an aggressive development and covert transmission of the computer users over the web, the steganography is acquiring its vogue day by day. It is the method to encode the covert data in a transmission medium in a fashion that the actuality of data must remain hidden. To protect the integrity of the data over the internet becomes necessary for the high sensitivity communications or the data transfers. The steganography carries a number of options for the embedding of the secret data into the cover data. In this manuscript, we have proposed the hybrid representation for the embedding of the data, which utilizes the random pattern embedding along with the cryptography for the higher steganography security levels. The proposed model has been designed to enhance the security level by utilizing the sequential data encoding and decoding in the video data. The video embedding creates the higher level of security for the embedded data. The experimental results have been obtained in the form of the embedding capacity, mean squared error (MSE) and Bits per Pixel (BPP). The proposed model has been found to be efficient enough for the video steganography.
Бесплатно
Rankings in Sport by Pairwise Comparison and League Table
Статья научная
This article describes a method of creating rankings in sport (medal tables). First, the countries are pairwise compared by area of the feasible points for which they are better. These feasible points correspond to gold, silver and bronze medals. After pairwise comparison we use the method of league table to rank the countries.
Бесплатно
Статья научная
Smart Home is a versatile system that incorporates several elements, i.e., visual intercom, home security, remote monitoring of home appliances, remote video surveillance, care systems and online education systems. The basic goal of a smart home is to connect various information-related communication devices, household appliances and home security devices in the home, to an intelligent system for centralized or remote monitoring, control and family affairs management. IoT refers to the infrastructure of connected physical devices, which is growing at a rapid rate, as a huge number of devices and objects are getting connected to the Internet. Internet of Things (IoT) is a significant part of the smart home scenario. It performs information exchange and communication between the home environment and smart system, through multiple sensors, such as photoelectric sensors, radio frequency identification, and so on. Its purpose is to realize real-time connection between objects and objects, objects and people, all items and networks, and to facilitate identification, management and control. This proposed paper presents a smart home application to support real-time correspondence to reduce the cost of implementation, to pursue life intelligence and comfort, with the hope that the system is able to provide a much more convenient and efficient energy saving consumption for the daily activities of the family. Having this application helps a lot of user to know the real-time notification in case of emergency occurs within the house, the advanced feathers of this application consisting of monitoring, control system and information support system as one stop-service application in order to assist user to know more environment context and being intermediate between user and home appliances. For example, if someone forgets to turn off the light when they are out of the home, and all other home appliances are active without being used. As such, a smart home, or home automation, which induces technology for the home atmosphere provides ease of use and the necessary protection to its occupants.
Бесплатно
Recent and frequent informative pages from web logs by weighted association rule mining
Статья научная
Web Usage Mining provides efficient ways of mining the web logs for knowing the user’s behavioral patterns. Existing literature have discussed about mining frequent pages of web logs by different means. Instead of mining all the frequently visited pages, if the criterion for mining frequent pages is based on a weighted setting then the compilation time and storage space would reduce. Hence in the proposed work, mining is performed by assigning weights to web pages based on two criteria. One is the time dwelled by a visitor on a particular page and the other is based on recent access of those pages. The proposed Weighted Window Tree (WWT) method performs Weighted Association Rule mining (WARM) for discovering the recently accessed frequent pages from web logs where the user has dwelled for more time and hence proves that these pages are more informative. WARM’s significance is in page weight assignment for targeting essential pages which has an advantage of mining lesser quality rules.
Бесплатно
Recommendation Techniques in Mobile Learning Context: A Review
Статья научная
The objective of this article is to make a bibliographic study on the recommendation of learning activities that can integrate user mobility. This type of recommendation makes it possible to exploit the history of previous visits in order to offer adaptive learning according to the instantaneous position of the learner and the pedagogy of the guide. To achieve this objective, we review the existing literature on the recommendation systems that integrate contexts such as geographic location and training profile. Next, we are interested in the social relationships that users can have between themselves. Finally, we focus on the work of recommending mobile learning activities in the context of scenarios of field trips.
Бесплатно
Статья научная
The need to change the professional practices in the nursing sciences obliges to accompany everyone towards a work on identity which engages a real process of professionalization. In addition, reflective practice (RP) has taken on more importance with this discourse on professionalization in nursing training settings. In this respect, reflection on practice is considered both as a competence of the professional teacher and upstream, in initial or continuing training, it is a tool for building one’s professional identity that can promote one’s professional development. From this perspective, this study aims to study the impact of reflexive practice on 235 teachers working at the level of 23 ISPITS (Higher Institute of Nursing Professions and Health Technologies) of the Kingdom of Morocco, by means of a questionnaire, whose internal validity has been approved, transmitted through the Google Forms platform. As such, this quantitative study will focus on two strands the 1st aims to study the existence of an impact of reflective practice on the professionalization of teaching within Moroccan ISPITS. The second objective is to study the nature of a possible relationship between the professionalization of teaching by the RP and the strengthening of the professional identity of ISPITS teachers. The results of this study show a positive impact of RP on the professionalization of nursing education; in addition, statistical tests have shown that there is a strong correlation between the professionalization of teaching in ISPITS and the strengthening of the professional identity of nursing teachers. Also, this study could contribute to improving other vocational training. In addition, consideration of occupational identity, as well as the relationship between it and its interactive experience with others and in varied environments that elicit reflective feedback on its professional practice, are likely to promote the professional development of each practitioner. The teacher's use of reflexivity is inseparable from his identity work. It will undoubtedly lead to the professionalization of training. In this perspective, similar studies can be carried out to deepen this theme and enhance their interventions.
Бесплатно
Reform of Database Course in Police Colleges Based on "Working Process"
Статья научная
According to the actual research results, combined with the teaching experience, this paper puts forward the reform method of the database course in police colleges. Based on the actual sector capacity requirement analysis, design of the five learning steps and four teaching scene, the task driven, project oriented, make students doing, learning by doing, students are required in the network security supervision work in the operation skill and ability.
Бесплатно
Статья научная
The purpose of this study is to investigate relationship of fifth, sixth, seventh and eighth grade students' scientific epistemological beliefs with their frequency of participating in laboratory activities. For this purpose, correlational study method was used. Sample of the study involved 301 students purposively selected from convenient schools. The data of the study was collected by a Likert type scale called "Scientific Epistemological Beliefs Scale" and information form about frequency of participating in laboratory activities and description of sample laboratory activities. The findings showed that majority of the students never participated in lab activities or participated in one time during one year. Also the fifth, sixth, seventh and eighth grade students' scientific epistemological beliefs were significantly related to their frequency of participating in laboratory activities. They are positively correlated to each other. However there were no significant relationships between the students' scientific epistemological beliefs and their frequency of participating in laboratory activities. Hence it can be claimed that participating in lab activities is associated with development of sophisticated scientific epistemological beliefs.
Бесплатно
Статья научная
An alternative model of intercultural sensitivity replicated from Chen and Starosta's five-factor model of Intercultural sensitivity was replicated validated at eight universities in Taiwan and Hainan, China. Both Confirmatory factor analysis and exploratory factor analysis were conducted to inspect the construct validity of the alternative model of Intercultural Sensitivity. Results indicated that three models fitted the data and the values of indicators were deemed acceptable; however, three-factor model of intercultural sensitivity with 10 items significantly fitted the data better than Chen and Starosta's five-factor model, Wu's four-factor model, and the revised two-factor model. This three-factor model, an alternative model, consists of three factors based on 10 items from the 24-item Intercultural Sensitivity Scale by Chen and Starosta; the reliability coefficient was .771, demonstrating high internal consistency. Participants from both Taiwan and Hainan represent ethnic Chinese who, although sharing similar cultures, still present cultural differences. This present study suggests an alternative model of the Intercultural Sensitivity that fits the characteristics of a sample of undergraduates from Hainan, China and Taiwan by reproducing Chen and Starosta's ISS.
Бесплатно