International Journal of Modern Education and Computer Science @ijmecs
Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1080

Quality Implication for Prognoses Success in Web Applications
Статья научная
Massive increase in usage of World Wide Web makes it affective in every domain of life. Billions of people from different corners of world use internet for diverse purposes on daily bases. Quality acts as important key factor for web applications. Various methodologies have been proposed and many techniques have been deployed but, quality still lags behind. Our study in-focuses a detailed survey based on methodologies, metrics and architecture that are used in modeling of web application. We carried out analysis and comparisons between techniques and evaluate major quality characteristics. Study at conclusion illustrates that beside functional requirements, non-functional requirements are also essential and acts as backbone for quality in web based applications.
Бесплатно

Статья научная
The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.
Бесплатно

Question Answering for Collaborative Learning with Answer Quality Predictor
Статья научная
The increasing advances of Internet Technologies in all application domains have changed life styles and interactions. With the rapid development of E-Learning, collaborative learning is an important for teaching, learning methods and strategies. Studies over the years shown that students had actively and more interactively involved in a classroom discussion to gain their knowledge. Students can ask their questions to the classroom discussion when they want to collaborate with others, asking one another for information, evaluating one another’s ideas. Therein, the activity allowing one question has many answer or information that should be selected. Every answer has a weighting and its very subjective to select it. In this paper, we introduce question answering for collaborative learning with answer quality predictor. By using answer quality predictor the quality of the information could be determined. Through the process of collaborative learning, the knowledge base will be enriched for future question answering. Further, not only the student could get answers form others but also provided by the system.
Бесплатно

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
Статья научная
Medical Image Watermarking has been considered as an appropriate method for enhancing the data security and content verification in medical science. For the purpose of achieving better security it is recommended to hide the data in the medical image itself that will improve the reliability of medical information system. In our paper, the work is divided in two main stages, first of all image is divided into two parts: Region of Interest that is defined as informational part of image and Region of Non Interest that is defined as non-informational part. In our work we have used Region of Non Interest to hide the data so that the informational part of the image kept safe. Watermark is encrypted by using RSA. A Discrete Wavelet Transform based approach is used for embedding the encrypted data in Region of Non Interest part of image for enhancing data security. The experimental result shows that watermark embedded by the proposed algorithm provides better security and can survive successfully under different attacks.
Бесплатно

Статья научная
Meditation refers to a family of self-regulation practices that focus on training attention and awareness in order to bring mental processes under greater voluntary control. The aim of this study is to evaluate the efficiency of two different classifiers, k-Nearest Neighbor (k-NN) and Radial Basis Function (RBF), on the heart rate signals in a specific psychological state. For this purpose, two types of heart rate time series (before, and during meditation) of 25 healthy women are collected in the meditation clinic in Mashhad. The spectral parameters are used to gain insight into the autonomic nervous system (ANS) response induced by meditation. Therefore, very low frequency, low frequency, high frequency, the LF/HF ratio and frequency of the highest spectral peak of heart rate signals are extracted and used as inputs of the classifiers. To evaluate performance of the classifiers, the classification accuracies and mean square error (MSE) of the classifiers were examined. The classification results of this study denote that the RBF classifier trained on spectral features obtains higher accuracy than that of k-NN classifier. The total classification accuracy of the RBF classifier is 92.3% with 0.026 classification error. However, k-Nearest Neighbor classifier gives encouraging results (86.5%). Experimental results verify that radial basis function is an efficient classifier for classifying heart rate signals in a specific psychological state.
Бесплатно

Rainfall Forecasting to Recommend Crops Varieties Using Moving Average and Naive Bayes Methods
Статья научная
Indonesia has been known as an agrarian country because of its fertile soil and is very suitable for agricultural land, including rice. Yogyakarta is one of the most significant granary regions in Indonesia, especially in the Sleman region. However, one of the main challenges in rice planting in recent years is the erratic rainfall patterns caused by climate anomalies due to the El Nino and La Nina phenomena. As a result of this phenomenon, farmers have difficulty determining planting time and harvest time and planting other plants. Therefore, we make rainfall predictions to recommend planting varieties with Moving Average and Naive Bayes Methods in Sleman District. The results showed that moving averages well use in predicting rainfall. From these results, we can estimate that in 2020 rice production will below. That can saw from the calculation of the probability of naive Bayes on rice plants being low at 0.999 and 0.923. So that the recommended intercrops planted in 2020 are corn and peanuts. We also find that rainfall prediction with Moving Average using data from several previous years in the same month is more accurate than using data from four past months or periods.
Бесплатно

Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding
Статья научная
Due to an aggressive development and covert transmission of the computer users over the web, the steganography is acquiring its vogue day by day. It is the method to encode the covert data in a transmission medium in a fashion that the actuality of data must remain hidden. To protect the integrity of the data over the internet becomes necessary for the high sensitivity communications or the data transfers. The steganography carries a number of options for the embedding of the secret data into the cover data. In this manuscript, we have proposed the hybrid representation for the embedding of the data, which utilizes the random pattern embedding along with the cryptography for the higher steganography security levels. The proposed model has been designed to enhance the security level by utilizing the sequential data encoding and decoding in the video data. The video embedding creates the higher level of security for the embedded data. The experimental results have been obtained in the form of the embedding capacity, mean squared error (MSE) and Bits per Pixel (BPP). The proposed model has been found to be efficient enough for the video steganography.
Бесплатно

Rankings in Sport by Pairwise Comparison and League Table
Статья научная
This article describes a method of creating rankings in sport (medal tables). First, the countries are pairwise compared by area of the feasible points for which they are better. These feasible points correspond to gold, silver and bronze medals. After pairwise comparison we use the method of league table to rank the countries.
Бесплатно

Статья научная
Smart Home is a versatile system that incorporates several elements, i.e., visual intercom, home security, remote monitoring of home appliances, remote video surveillance, care systems and online education systems. The basic goal of a smart home is to connect various information-related communication devices, household appliances and home security devices in the home, to an intelligent system for centralized or remote monitoring, control and family affairs management. IoT refers to the infrastructure of connected physical devices, which is growing at a rapid rate, as a huge number of devices and objects are getting connected to the Internet. Internet of Things (IoT) is a significant part of the smart home scenario. It performs information exchange and communication between the home environment and smart system, through multiple sensors, such as photoelectric sensors, radio frequency identification, and so on. Its purpose is to realize real-time connection between objects and objects, objects and people, all items and networks, and to facilitate identification, management and control. This proposed paper presents a smart home application to support real-time correspondence to reduce the cost of implementation, to pursue life intelligence and comfort, with the hope that the system is able to provide a much more convenient and efficient energy saving consumption for the daily activities of the family. Having this application helps a lot of user to know the real-time notification in case of emergency occurs within the house, the advanced feathers of this application consisting of monitoring, control system and information support system as one stop-service application in order to assist user to know more environment context and being intermediate between user and home appliances. For example, if someone forgets to turn off the light when they are out of the home, and all other home appliances are active without being used. As such, a smart home, or home automation, which induces technology for the home atmosphere provides ease of use and the necessary protection to its occupants.
Бесплатно

Recent and frequent informative pages from web logs by weighted association rule mining
Статья научная
Web Usage Mining provides efficient ways of mining the web logs for knowing the user’s behavioral patterns. Existing literature have discussed about mining frequent pages of web logs by different means. Instead of mining all the frequently visited pages, if the criterion for mining frequent pages is based on a weighted setting then the compilation time and storage space would reduce. Hence in the proposed work, mining is performed by assigning weights to web pages based on two criteria. One is the time dwelled by a visitor on a particular page and the other is based on recent access of those pages. The proposed Weighted Window Tree (WWT) method performs Weighted Association Rule mining (WARM) for discovering the recently accessed frequent pages from web logs where the user has dwelled for more time and hence proves that these pages are more informative. WARM’s significance is in page weight assignment for targeting essential pages which has an advantage of mining lesser quality rules.
Бесплатно

Recommendation Techniques in Mobile Learning Context: A Review
Статья научная
The objective of this article is to make a bibliographic study on the recommendation of learning activities that can integrate user mobility. This type of recommendation makes it possible to exploit the history of previous visits in order to offer adaptive learning according to the instantaneous position of the learner and the pedagogy of the guide. To achieve this objective, we review the existing literature on the recommendation systems that integrate contexts such as geographic location and training profile. Next, we are interested in the social relationships that users can have between themselves. Finally, we focus on the work of recommending mobile learning activities in the context of scenarios of field trips.
Бесплатно

Статья научная
The need to change the professional practices in the nursing sciences obliges to accompany everyone towards a work on identity which engages a real process of professionalization. In addition, reflective practice (RP) has taken on more importance with this discourse on professionalization in nursing training settings. In this respect, reflection on practice is considered both as a competence of the professional teacher and upstream, in initial or continuing training, it is a tool for building one’s professional identity that can promote one’s professional development. From this perspective, this study aims to study the impact of reflexive practice on 235 teachers working at the level of 23 ISPITS (Higher Institute of Nursing Professions and Health Technologies) of the Kingdom of Morocco, by means of a questionnaire, whose internal validity has been approved, transmitted through the Google Forms platform. As such, this quantitative study will focus on two strands the 1st aims to study the existence of an impact of reflective practice on the professionalization of teaching within Moroccan ISPITS. The second objective is to study the nature of a possible relationship between the professionalization of teaching by the RP and the strengthening of the professional identity of ISPITS teachers. The results of this study show a positive impact of RP on the professionalization of nursing education; in addition, statistical tests have shown that there is a strong correlation between the professionalization of teaching in ISPITS and the strengthening of the professional identity of nursing teachers. Also, this study could contribute to improving other vocational training. In addition, consideration of occupational identity, as well as the relationship between it and its interactive experience with others and in varied environments that elicit reflective feedback on its professional practice, are likely to promote the professional development of each practitioner. The teacher's use of reflexivity is inseparable from his identity work. It will undoubtedly lead to the professionalization of training. In this perspective, similar studies can be carried out to deepen this theme and enhance their interventions.
Бесплатно

Reform of Database Course in Police Colleges Based on "Working Process"
Статья научная
According to the actual research results, combined with the teaching experience, this paper puts forward the reform method of the database course in police colleges. Based on the actual sector capacity requirement analysis, design of the five learning steps and four teaching scene, the task driven, project oriented, make students doing, learning by doing, students are required in the network security supervision work in the operation skill and ability.
Бесплатно

Статья научная
The purpose of this study is to investigate relationship of fifth, sixth, seventh and eighth grade students' scientific epistemological beliefs with their frequency of participating in laboratory activities. For this purpose, correlational study method was used. Sample of the study involved 301 students purposively selected from convenient schools. The data of the study was collected by a Likert type scale called "Scientific Epistemological Beliefs Scale" and information form about frequency of participating in laboratory activities and description of sample laboratory activities. The findings showed that majority of the students never participated in lab activities or participated in one time during one year. Also the fifth, sixth, seventh and eighth grade students' scientific epistemological beliefs were significantly related to their frequency of participating in laboratory activities. They are positively correlated to each other. However there were no significant relationships between the students' scientific epistemological beliefs and their frequency of participating in laboratory activities. Hence it can be claimed that participating in lab activities is associated with development of sophisticated scientific epistemological beliefs.
Бесплатно

Статья научная
An alternative model of intercultural sensitivity replicated from Chen and Starosta's five-factor model of Intercultural sensitivity was replicated validated at eight universities in Taiwan and Hainan, China. Both Confirmatory factor analysis and exploratory factor analysis were conducted to inspect the construct validity of the alternative model of Intercultural Sensitivity. Results indicated that three models fitted the data and the values of indicators were deemed acceptable; however, three-factor model of intercultural sensitivity with 10 items significantly fitted the data better than Chen and Starosta's five-factor model, Wu's four-factor model, and the revised two-factor model. This three-factor model, an alternative model, consists of three factors based on 10 items from the 24-item Intercultural Sensitivity Scale by Chen and Starosta; the reliability coefficient was .771, demonstrating high internal consistency. Participants from both Taiwan and Hainan represent ethnic Chinese who, although sharing similar cultures, still present cultural differences. This present study suggests an alternative model of the Intercultural Sensitivity that fits the characteristics of a sample of undergraduates from Hainan, China and Taiwan by reproducing Chen and Starosta's ISS.
Бесплатно

Requirement elicitation methods for cloud providers in IT industry
Статья научная
In cloud computing, requirements engineering is a greatly under-researched topic. Requirement elicitation is a key activity that helps in assemble the requirements of a system from different users, customers and stakeholders. Cloud services providers need methods to correctly elicit requirements from consumers, as the consumers of cloud services are more diverse and there occur some conflictions in the non-functional requirement of some kinds of consumers. Sometimes eliciting security requirements is an important task, because the cloud services are acquired by potential cloud consumers are secure for them to use. Both literature and market surveys are performed on different elicitation approaches that are followed by CSPs to fetch consumer requirements, recommendations and data from cloud service providers and from consumers of cloud computing services. This study aims to discuss the elicitation methods being used by cloud providers in Pakistan IT industry, and the resulting feedback of the consumers by these methods. This would lead to determine current elicitation methods are sufficient or there is a need to design a new elicitation method that can sufficiently provide with more customer satisfaction. We have used semi-structured interviews and questionnaires to gather information about the elicitation techniques that are used by cloud providers to elicit consumer requirements. This study is conducted in Pakistan IT industry. Somehow, this research enlightens the trend and scope of cloud computing in Pakistan. This study would be beneficial for cloud providers adequately gather their consumer requirements and enhance the knowledge of elicitation techniques that are used by cloud providers.
Бесплатно

Requirements Engineering in Software Houses of Pakistan
Статья научная
Requirement engineering is an essence of software development life cycle. The more time we spend on requirement engineering, higher the probability of success. Effective requirement engineering ensures and predicts successful software product. This paper presents the adaptation of requirement engineering practices in small and medium size companies of Pakistan. The study is conducted by questionnaires to show how much of requirement engineering models and practices are followed in Pakistan.
Бесплатно

Research Supervisor Recommendation System Based on Topic Conformity
Статья научная
In a higher education such as universities, final project are under supervision of one or more supervisors with a similar research interest or topic. The determination of the final project supervisor is an important factor in the work of the student's final project. However, the lack of information about the supervisor can hamper students in making the determination of the supervisor. Thus, a system is needed that can facilitate students in determining the final project or thesis advisors in accordance with the research topic. This problem is the basis of this research. The study is conducted by developing a web-based system and applying the TF-IDF word weighting and cosine similarity method. TF-IDF method is a way to give the weight of the relationship of a word to the document. The cosine similarity is a method for calculating the similarity between two objects expressed in two vectors by using keywords from a document as a measure. The results of the advisor recommendation system can provide recommendations to students regarding the final assignment advisor who has conducted research in accordance with the topic of the student's final assignment written in Indonesian. In 20 testing, the accuracy of the comparison of the results of the system recommendations with the actual data obtained an average of 75% by comparing system recommendation with actual assigned supervisor.
Бесплатно

Research of Heated Oil Pipeline Shutdown and Restart Process Based on VB and MATLAB
Статья научная
During the operation of a heated oil transportation pipeline, the shutdown was caused by some pipeline accidents and repairing. In order to ensure the safety operation of the pipeline, determine the temperature drop and restart pressure was needed at different shutdown is important. This paper builds the heated oil pipeline temperature drop model after shutdown based on the unsteady heat transfer theory and restart model based on fluid transient flow theory. In order to solve the models, MATLAB is adopted a code for the models solving program. VB and MATLAB hybrid programming method which is on the basis of COM technical is utilized to develop a friendly man-machine interface for the heated oil pipeline shutdown and restart simulation software. The practical application shows using of VB and MATLAB hybrid programming method can reduce the work of algorithm developing and enhance the reliability of heated oil pipeline shutdown and restart simulation software.
Бесплатно

Статья научная
To achieve higher education internationalization and improve the comprehensive ability of graduates, according to the education characteristics and development model of graduates for computer specialty in financial and economical colleges, the intrinsic relation between computer and English, and the importance of graduates for implementing bilingual teaching in financial and economical colleges, an effective training project of bilingual teaching for computer graduates in financial and economical colleges is proposed in this paper, which is based on years of teaching experience in practice and suitable for the economy development demands in China. In addition, a more perfect measure for computer graduates in financial and economical colleges is also introduced in this paper, so that the education of computer graduates in financial and economical colleges is different from the computer specialty in comprehensive universities. It can build a good basis and provide a feasible approach to training the comprehensive talents by performing bilingual teaching that are needed urgently in international communities.
Бесплатно