Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1064
Requirement elicitation methods for cloud providers in IT industry
Статья научная
In cloud computing, requirements engineering is a greatly under-researched topic. Requirement elicitation is a key activity that helps in assemble the requirements of a system from different users, customers and stakeholders. Cloud services providers need methods to correctly elicit requirements from consumers, as the consumers of cloud services are more diverse and there occur some conflictions in the non-functional requirement of some kinds of consumers. Sometimes eliciting security requirements is an important task, because the cloud services are acquired by potential cloud consumers are secure for them to use. Both literature and market surveys are performed on different elicitation approaches that are followed by CSPs to fetch consumer requirements, recommendations and data from cloud service providers and from consumers of cloud computing services. This study aims to discuss the elicitation methods being used by cloud providers in Pakistan IT industry, and the resulting feedback of the consumers by these methods. This would lead to determine current elicitation methods are sufficient or there is a need to design a new elicitation method that can sufficiently provide with more customer satisfaction. We have used semi-structured interviews and questionnaires to gather information about the elicitation techniques that are used by cloud providers to elicit consumer requirements. This study is conducted in Pakistan IT industry. Somehow, this research enlightens the trend and scope of cloud computing in Pakistan. This study would be beneficial for cloud providers adequately gather their consumer requirements and enhance the knowledge of elicitation techniques that are used by cloud providers.
Бесплатно
Requirements Engineering in Software Houses of Pakistan
Статья научная
Requirement engineering is an essence of software development life cycle. The more time we spend on requirement engineering, higher the probability of success. Effective requirement engineering ensures and predicts successful software product. This paper presents the adaptation of requirement engineering practices in small and medium size companies of Pakistan. The study is conducted by questionnaires to show how much of requirement engineering models and practices are followed in Pakistan.
Бесплатно
Research Supervisor Recommendation System Based on Topic Conformity
Статья научная
In a higher education such as universities, final project are under supervision of one or more supervisors with a similar research interest or topic. The determination of the final project supervisor is an important factor in the work of the student's final project. However, the lack of information about the supervisor can hamper students in making the determination of the supervisor. Thus, a system is needed that can facilitate students in determining the final project or thesis advisors in accordance with the research topic. This problem is the basis of this research. The study is conducted by developing a web-based system and applying the TF-IDF word weighting and cosine similarity method. TF-IDF method is a way to give the weight of the relationship of a word to the document. The cosine similarity is a method for calculating the similarity between two objects expressed in two vectors by using keywords from a document as a measure. The results of the advisor recommendation system can provide recommendations to students regarding the final assignment advisor who has conducted research in accordance with the topic of the student's final assignment written in Indonesian. In 20 testing, the accuracy of the comparison of the results of the system recommendations with the actual data obtained an average of 75% by comparing system recommendation with actual assigned supervisor.
Бесплатно
Research of Heated Oil Pipeline Shutdown and Restart Process Based on VB and MATLAB
Статья научная
During the operation of a heated oil transportation pipeline, the shutdown was caused by some pipeline accidents and repairing. In order to ensure the safety operation of the pipeline, determine the temperature drop and restart pressure was needed at different shutdown is important. This paper builds the heated oil pipeline temperature drop model after shutdown based on the unsteady heat transfer theory and restart model based on fluid transient flow theory. In order to solve the models, MATLAB is adopted a code for the models solving program. VB and MATLAB hybrid programming method which is on the basis of COM technical is utilized to develop a friendly man-machine interface for the heated oil pipeline shutdown and restart simulation software. The practical application shows using of VB and MATLAB hybrid programming method can reduce the work of algorithm developing and enhance the reliability of heated oil pipeline shutdown and restart simulation software.
Бесплатно
Статья научная
To achieve higher education internationalization and improve the comprehensive ability of graduates, according to the education characteristics and development model of graduates for computer specialty in financial and economical colleges, the intrinsic relation between computer and English, and the importance of graduates for implementing bilingual teaching in financial and economical colleges, an effective training project of bilingual teaching for computer graduates in financial and economical colleges is proposed in this paper, which is based on years of teaching experience in practice and suitable for the economy development demands in China. In addition, a more perfect measure for computer graduates in financial and economical colleges is also introduced in this paper, so that the education of computer graduates in financial and economical colleges is different from the computer specialty in comprehensive universities. It can build a good basis and provide a feasible approach to training the comprehensive talents by performing bilingual teaching that are needed urgently in international communities.
Бесплатно
Research on Cultivation of Ethnic Minorities IT Talents in Nationalities Universities
Статья научная
To promote cultural and information undertakings of the ethnic minorities such as digital publication and network governance, a series of experience training programs for nationalities universities are established to cultivate high-quality IT technology talents. Here, Dalian Nationalities University is taken as an example. These training programs adopted a so called "four-phrases, five capabilities" training method. That is, four phrases consist of professional quality training, professional basic theory strengthening, job skills training and job practice, centering on training five capabilities of professional morality, software programming fundamentals, language competence, software engineering and project practice. Based on the training method, one well-rounded and multiple perspective assessment method are put forward. This assessment system integrated academic knowledge evaluation and professional competence assessment, adopting various forms such as coding, competition, discussion, peer review online and deliverables exhibition. These practice training courses break through the knowledge barrier and put emphasis on professional competence cultivation, which improves teaching quality and assesses learning effects objectively and fairly during teaching process.
Бесплатно
Research on Five Stakeholders & Five Relationships of Higher Engineering Education in China
Статья научная
With the development of globalization, higher engineering education has been on the rise which includes five Stakeholders and five relationships. This paper will discuss five relations of higher engineering education: teaching, research and social services, professional education and humanity education, ability education and knowledge education, theoretical teaching and practical teaching, development of education and development of national and regional economy. Among them, teaching, research and social services are three major functions of higher engineering universities; professional education and humanity education, ability education and knowledge education, theoretical teaching and practical teaching are the goals of higher engineering education; development of education and development of national and regional economy involve the interaction between higher engineering universities and society. Furthermore, the five stakeholders are students, teachers, universities, employers and governments. The five relationships and five stakeholders of higher engineering education are reunified firstly, and at the same time, the driving force of various interests of higher engineering education is analyzed thoroughly at the higher level for guiding and enlightening the future development of our country’s higher engineering education.
Бесплатно
Research on Fuzzy Comprehensive Evaluation in Practice Teaching Assessment of Computer Majors
Статья научная
Practice teaching is an inseparable part of professional courses for computer majors, which helps to cultivate capability of coding and engineering for students. Progress assessment and result assessment are two common ways to assess the practice teaching. But only by class attendance and programming result, it is not scientific and reasonable for all students to get the final assessment result. And it is not scientific to evaluate teaching quality only by classroom observations or instructional supervision too. How to assess the practice teaching from multiple perspectives scientifically is key point of this paper. A new assessment called fuzzy comprehensive evaluation from different targets collecting from five assessment means is adopted to complete the task. Based on five targets of grade 1 and corresponding targets of grade 2, one fuzzy matrix is constructed with membership determining and one quantitative result is obtained based on calculation of fuzzy matrix. This assessment method breaks through the knowledge barrier and puts emphasis on competence assessment and teaching evaluation, which improves teaching quality in the teaching process. Adopting this assessment method, students' learning effects can be assessed objectively and fairly, which will result in inspiring students' passion for independent learning and helping them to build employment challenge self-confidence with optimistic and positive attitudes. And teachers will get effective feedback and professional suggestions from experts, students and management department to improve their practice teaching in the future.
Бесплатно
Статья научная
The web service has great significance and value since it represents a large industrial sector and huge trade interests, but the function of a single web service is too small to satisfy the need of service requestor, so it is necessary to combine a mount of simple services to satisfy the complex and dynamic requirement in practice, then the problem of web services composition is one of the research hotspot. This paper generalized the primary interaction processes between enterprise and customer in marketing, encapsulated the special function for marketing works as the agent, and considered the marketing as the cooperation process of agents focusing on requirements, and based on that a multi-agent based marketing cooperation system (MAMCS) is established and the agent ontology is designed according to JADE, finally the negotiation mechanism is built. The method of multi-agent services aggregation driven by requirement supposed in this paper can improve the utilizing effect of service, reduce the difficulty of services composition, and realize the automatic purpose of services composition. Moreover, by combining the merits of agent technique the initiation and intelligence of the services are improved, that safeguard the best interests of the service providers due to they have an option on requirements.
Бесплатно
Research on Spacecraft Illumination
Статья научная
Illumination analysis of spacecraft is very important. This paper firstly introduces the importance of spacecraft illumination analysis in aerospace fields and points out that illumination conditions will influence the design of shape of spacecraft body and the installation of spacecraft equipments. Then, it discusses two methods for analyzing spacecraft solar-panel shadow and illumination conditions: ray tracing illumination algorithm and polyhedral mesh contour edge projection algorithm and compares their efficiency and feasibility. Shadow area and solar area are computed of every cell on solar panels. We designed solar panel single-axis rotation experiment to validate the proposed algorithm. The experimental results show that contour edge projection algorithm has fine accuracy and costs less time. For detailed illumination information, we apply a practical segment clipping algorithm after some comparisons.
Бесплатно
Research on security situation assessment model of video transmission network
Статья научная
In this paper, we propose a situation assessment model for video transmission network, which evaluates the security risk of video transmission network information from four aspects: front-end perception layer, transmission layer, application layer and other risks.We divide the video network security evaluation system into three layers, and use AHP to determine the weight of each index.The weights of these four aspects are calculated by analytic hierarchy process.The method proposed in this paper can provide an evaluation system and a calculation method for the safe operation of video transmission network and important systems, and can provide specialized information security services for the construction project of video transmission network.
Бесплатно
Статья научная
The research of Boolean index sets of graphs is one of the most important graph theories in the graph theory . Boolean index sets of graphs are to use the vertex sets and the edge sets of graphs to study the characteristics of various graphs and their inherent characteristics through corresponding the mapping function to Z_2. It’s theory can be applied to information engineering, communication networks, computer science, economic management, medicine, etc. The edge-balance index set is an important issue in Boolean index set. In this paper, we defined edge-friendly labeling of the graph, edge-balance index set of the graph and the graph {[C_(3^m)×P_(m_3)](m≥3)}. we completely determine the edge-balance index sets of the graph [C_(3^m)×P_(m_3)] for the integer [m≡3,0 (mod 4)] and solve formula proof and graphic tectonic methods.
Бесплатно
Resource Allocation Policies for Fault Detection and Removal Process
Статья научная
In software testing, fault detection and removal process is one of the key elements for quality assurance of the software. In the last three decades, several software reliability growth models were developed for detection and correction of faults. These models were developed under strictly static assumptions. The main goal of this article is to investigate an optimal resource allocation plan for fault detection and removal process of software to minimize cost during testing and operational phase under dynamic condition. For this we develop a mathematical model for fault detection and removal process and Pontryagain's Maximum principle is applied for solving the model. Genetic algorithm is used to find the optimal allocation of fault detection and removal process. Numerical example is also solved for resource allocation for fault detection and remoal process.
Бесплатно
Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing
Статья научная
Cloud Computing has managed to attract the entire buzz in the growing era of technology due to its on-demand services for resource request. Despite of the enormous growth of cloud computing, there are many problems related to resource allocation in cloud that are still unaddressed. Current work for resource allocation strategy focuses on various methods to place Virtual Machine per appropriate requests. The current state of art focuses on the dynamic nature of the work load on cloud. But there is still scope of improvement in the resource allocation strategies that have been proposed in terms of well-balanced network even at the resource contention. This study proposes a hybrid model composed of lease methodology and dynamic load balancing algorithm, with an attempt to overcome the problems of resource contention and starvation and a well-balanced network even at the input of varying loads. An attempt to increase the CPU utilization and throughput along with no request rejection is taken. The work also retains the lease options for its clients thus maintaining the anti-starvation for pre-emptible requests.
Бесплатно
Reversible Shift Counter Design on QCA
Статья научная
In the Current scenario of higher level of integration the most encountered problems are heat dissipation and information loss on each and every computation. For the sake of eliminating these issues Reversible computing is being adopted as a preferable substitute of digital circuit design. This paper focuses on the design of Reversible Ring Counter and Twisted Ring Counter using Reversible D flip flop implemented with the Novel Design of Feynman and Fredkin Gate. Ring counters are commonly found in applications used to count the data in a continuous loop as well as in frequency divider circuits. While twisted (or Johnson) ring counter is used as three-phase square wave generators (using 3 flip-flops) and quadrature oscillator circuits (using 2 flip-flops) etc. The response of the proposed counter circuit is tested with the help of QCADesigner 2.0.3 simulation tool and the Energy dissipation is analyzed by the use of QCA Designer-E tool.
Бесплатно
Review Length Aware Hybrid Approach to Sentiment Analysis
Статья научная
Sentiment analysis is a popular research problem to find out within the natural language processing that is dealing with identifying the sentiments or mood of people's towards elements such as product, text, services and the technology. However, there are few researches conducted on the sentiment analysis of technical article review, so to overcome this deficiency conducts the sentiment analysis over the technical article review and classifying the sentence by overall sentiments that is representing the review is positive or negative. The paper presents the combination of SVM and KNN and find out how much given article sound technically good. The proposed technique is compared with other existing techniques and results shows that the proposed technique is better as compared to the other technique.
Бесплатно
Review of Requirements Management Issues in Software Development
Статья научная
A requirement is a capability to which a product or service should conform to. A meticulous consideration to requirements engineering acts as a backbone of software projects. Ambiguous and unrealistic requirements are major source of failure in the software-intensive systems. Requirements engineering processes are complex as most of the requirements engineering documentation is written in natural languages which are less formal and often distract the designers and developers. Requirements management is a continuous process throughout the project lifecycle and relates to documenting, analyzing, tracing and prioritizing requirements and then finally controlling changes. The main issues related to requirements management are usually social, political and cultural. Software requirement engineers who gather the requirements generally consider that such issues are beyond the scope of their profession as they deem them within the project management ambit. In this study, we highlight the management issues that arise in the requirements engineering process and explore the possibilities to tackle them amicably. The study is supplemented with a critical review of the existing methodologies for resolving and managing software requirements.
Бесплатно
Review on predicting students’ graduation time using machine learning algorithms
Статья научная
Nowadays, the application of data mining is widely prevalent in the education system. The ability of data mining to obtain meaningful information from meaningless data makes it very useful to predict students’ achievement, university’s performance, and many more. According to the Department of Statistics Malaysia, the numbers of student who do not manage to graduate on time rise dramatically every year. This challenging scenario worries many parties, especially university management teams. They have to timely devise strategies in order to enhance the students’ academic achievement and discover the main factors contributing to the timely graduation of undergraduate students. This paper discussed the factors utilized by other researchers from previous studies to predict students’ graduation time and to study the impact of different types of factors with different prediction methods. Taken together, findings of this research confirmed the usefulness of Neural Network and Support Vector Machine as the most competitive classifiers compared with Naïve Bayes and Decision Tree. Furthermore, our findings also indicate that the academic assessment was a prominent factor when predicting students’ graduation time.
Бесплатно
Статья научная
This paper delves into the transformative potential of artificial intelligence (AI), particularly focusing on ChatGPT, within educational realms. By conducting an exhaustive review across various scholarly publications and case studies, this research unveils ChatGPT’s multifaceted role in redefining educational landscapes–ranging from enhancing programming proficiency and fostering creativity in writing, to augmenting student engagement. Our findings illuminate the dual-edged influence of ChatGPT in education, showcasing not only its ability to tailor learning experiences and facilitate programming and creative writing but also its capacity to fortify student-teacher interactions. However, the study does not shy away from highlighting the intricate challenges that accompany the integration of AI in education, including concerns over academic integrity, ethical considerations, and the need for a balanced amalgamation with traditional pedagogical methods. Innovatively, this research proposes a forward-thinking, ethical framework for AI integration in educational settings, advocating for a harmonious blend of ChatGPT’s capabilities with human educators' insights to foster a more engaging, effective, and equitable learning environment. By introducing groundbreaking strategies for integrating interactive learning technologies with ChatGPT, and emphasizing the development of personalized educational trajectories, our study sets a new benchmark for future AI applications in education. The paper’s exploration into the innovative integration of ChatGPT with Virtual Reality (VR) offers a glimpse into the future of immersive learning experiences, opening new avenues for engaging and experiential learning. Through empirical validation and a nuanced discussion on the ethical deployment of AI tools in education, this study marks a significant contribution to the discourse on AI’s role in education, providing valuable insights for educators, policymakers, and technologists alike.
Бесплатно
Статья научная
In the modern era, the ideas related to software developments are totally replaced the old traditional software development to CBSD. CBSD is the approach that can provide reusability of components to develop new software under minimum chances of risks. Beyond the CBSD features, there are still some significant risks overall the development phase. Generally, the quality of a developed software is depending upon the component integration phase. Nevertheless, component integration phase plays a tremendous role in the success of CBSD that leads to develop new risk free software. The objective of this research was to identify all the risks in CBSD and applied risk reduction activities to mitigate these risks. On the basis of the literature survey, categorized the risks into different categories. For this, an online questionnaire was performed to identify the risks and the risk reduction activities. 85% results point out that CBSD approach is the best approach as compared to the traditional approach. 80% results show that it performs the risk reduction activities, then the quality of the product improves. However, it is a step towards the mitigation of the vulnerabilities and reducing the cost of maintenance.
Бесплатно