Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 1096

Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing

Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing

Pooja S. Kshirsagar, Anita M. Pujar

Статья научная

Cloud Computing has managed to attract the entire buzz in the growing era of technology due to its on-demand services for resource request. Despite of the enormous growth of cloud computing, there are many problems related to resource allocation in cloud that are still unaddressed. Current work for resource allocation strategy focuses on various methods to place Virtual Machine per appropriate requests. The current state of art focuses on the dynamic nature of the work load on cloud. But there is still scope of improvement in the resource allocation strategies that have been proposed in terms of well-balanced network even at the resource contention. This study proposes a hybrid model composed of lease methodology and dynamic load balancing algorithm, with an attempt to overcome the problems of resource contention and starvation and a well-balanced network even at the input of varying loads. An attempt to increase the CPU utilization and throughput along with no request rejection is taken. The work also retains the lease options for its clients thus maintaining the anti-starvation for pre-emptible requests.

Бесплатно

Reversible Shift Counter Design on QCA

Reversible Shift Counter Design on QCA

Abhinay Choudhary, Snigdha Singh, Manoj Kumar Jain

Статья научная

In the Current scenario of higher level of integration the most encountered problems are heat dissipation and information loss on each and every computation. For the sake of eliminating these issues Reversible computing is being adopted as a preferable substitute of digital circuit design. This paper focuses on the design of Reversible Ring Counter and Twisted Ring Counter using Reversible D flip flop implemented with the Novel Design of Feynman and Fredkin Gate. Ring counters are commonly found in applications used to count the data in a continuous loop as well as in frequency divider circuits. While twisted (or Johnson) ring counter is used as three-phase square wave generators (using 3 flip-flops) and quadrature oscillator circuits (using 2 flip-flops) etc. The response of the proposed counter circuit is tested with the help of QCADesigner 2.0.3 simulation tool and the Energy dissipation is analyzed by the use of QCA Designer-E tool.

Бесплатно

Review Length Aware Hybrid Approach to Sentiment Analysis

Review Length Aware Hybrid Approach to Sentiment Analysis

Babaljeet Kaur, Naveen Kumari

Статья научная

Sentiment analysis is a popular research problem to find out within the natural language processing that is dealing with identifying the sentiments or mood of people's towards elements such as product, text, services and the technology. However, there are few researches conducted on the sentiment analysis of technical article review, so to overcome this deficiency conducts the sentiment analysis over the technical article review and classifying the sentence by overall sentiments that is representing the review is positive or negative. The paper presents the combination of SVM and KNN and find out how much given article sound technically good. The proposed technique is compared with other existing techniques and results shows that the proposed technique is better as compared to the other technique.

Бесплатно

Review of Requirements Management Issues in Software Development

Review of Requirements Management Issues in Software Development

Muhammad Naeem Ahmed Khan, Muhammad Khalid, Sami ul Haq

Статья научная

A requirement is a capability to which a product or service should conform to. A meticulous consideration to requirements engineering acts as a backbone of software projects. Ambiguous and unrealistic requirements are major source of failure in the software-intensive systems. Requirements engineering processes are complex as most of the requirements engineering documentation is written in natural languages which are less formal and often distract the designers and developers. Requirements management is a continuous process throughout the project lifecycle and relates to documenting, analyzing, tracing and prioritizing requirements and then finally controlling changes. The main issues related to requirements management are usually social, political and cultural. Software requirement engineers who gather the requirements generally consider that such issues are beyond the scope of their profession as they deem them within the project management ambit. In this study, we highlight the management issues that arise in the requirements engineering process and explore the possibilities to tackle them amicably. The study is supplemented with a critical review of the existing methodologies for resolving and managing software requirements.

Бесплатно

Review on predicting students’ graduation time using machine learning algorithms

Review on predicting students’ graduation time using machine learning algorithms

Nurafifah Mohammad Suhaimi, Shuzlina Abdul-Rahman, Sofianita Mutalib, Nurzeatul Hamimah Abdul Hamid, Ariff Md Ab Malik

Статья научная

Nowadays, the application of data mining is widely prevalent in the education system. The ability of data mining to obtain meaningful information from meaningless data makes it very useful to predict students’ achievement, university’s performance, and many more. According to the Department of Statistics Malaysia, the numbers of student who do not manage to graduate on time rise dramatically every year. This challenging scenario worries many parties, especially university management teams. They have to timely devise strategies in order to enhance the students’ academic achievement and discover the main factors contributing to the timely graduation of undergraduate students. This paper discussed the factors utilized by other researchers from previous studies to predict students’ graduation time and to study the impact of different types of factors with different prediction methods. Taken together, findings of this research confirmed the usefulness of Neural Network and Support Vector Machine as the most competitive classifiers compared with Naïve Bayes and Decision Tree. Furthermore, our findings also indicate that the academic assessment was a prominent factor when predicting students’ graduation time.

Бесплатно

Review the Prospects and Obstacles of AI-Enhanced Learning Environments: The Role of ChatGPT in Education

Review the Prospects and Obstacles of AI-Enhanced Learning Environments: The Role of ChatGPT in Education

Khalid Alshahrani, Rizwan Jameel Qureshi

Статья научная

This paper delves into the transformative potential of artificial intelligence (AI), particularly focusing on ChatGPT, within educational realms. By conducting an exhaustive review across various scholarly publications and case studies, this research unveils ChatGPT’s multifaceted role in redefining educational landscapes–ranging from enhancing programming proficiency and fostering creativity in writing, to augmenting student engagement. Our findings illuminate the dual-edged influence of ChatGPT in education, showcasing not only its ability to tailor learning experiences and facilitate programming and creative writing but also its capacity to fortify student-teacher interactions. However, the study does not shy away from highlighting the intricate challenges that accompany the integration of AI in education, including concerns over academic integrity, ethical considerations, and the need for a balanced amalgamation with traditional pedagogical methods. Innovatively, this research proposes a forward-thinking, ethical framework for AI integration in educational settings, advocating for a harmonious blend of ChatGPT’s capabilities with human educators' insights to foster a more engaging, effective, and equitable learning environment. By introducing groundbreaking strategies for integrating interactive learning technologies with ChatGPT, and emphasizing the development of personalized educational trajectories, our study sets a new benchmark for future AI applications in education. The paper’s exploration into the innovative integration of ChatGPT with Virtual Reality (VR) offers a glimpse into the future of immersive learning experiences, opening new avenues for engaging and experiential learning. Through empirical validation and a nuanced discussion on the ethical deployment of AI tools in education, this study marks a significant contribution to the discourse on AI’s role in education, providing valuable insights for educators, policymakers, and technologists alike.

Бесплатно

Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD)

Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD)

Fariha Fatima, Saqib Ali, Muhammad Usman Ashraf

Статья научная

In the modern era, the ideas related to software developments are totally replaced the old traditional software development to CBSD. CBSD is the approach that can provide reusability of components to develop new software under minimum chances of risks. Beyond the CBSD features, there are still some significant risks overall the development phase. Generally, the quality of a developed software is depending upon the component integration phase. Nevertheless, component integration phase plays a tremendous role in the success of CBSD that leads to develop new risk free software. The objective of this research was to identify all the risks in CBSD and applied risk reduction activities to mitigate these risks. On the basis of the literature survey, categorized the risks into different categories. For this, an online questionnaire was performed to identify the risks and the risk reduction activities. 85% results point out that CBSD approach is the best approach as compared to the traditional approach. 80% results show that it performs the risk reduction activities, then the quality of the product improves. However, it is a step towards the mitigation of the vulnerabilities and reducing the cost of maintenance.

Бесплатно

Robust Algorithm for Face Detection in Color Images

Robust Algorithm for Face Detection in Color Images

Hlaing Htake Khaung Tin

Статья научная

Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that a face is already located in the given image or the image sequence. Facial features such as eyes, nose and mouth are automatically detected based on properties of the associated image regions. On detecting a mouth, a nose and two eyes, a face verification step based on Eigen face theory is applied to a normalized search space in the image relative to the distance between the eye feature points. The experiments were carried out on test images taken from the internet and various other randomly selected sources. The algorithm has also been tested in practice with a webcam, giving (near) real-time performance and good extraction results.

Бесплатно

Robustness Evaluation for Military Communi-cation Effectiveness based on Multiple Data Sources and Monte Carlo Simulation

Robustness Evaluation for Military Communi-cation Effectiveness based on Multiple Data Sources and Monte Carlo Simulation

Fuli Shi, Chao Li, Yifan Zhu

Статья научная

In the choice process of optimal military commu-nication (MC) alternative, evaluation data mainly come from expert judgments, simulation results and test bed data, and they cannot be directly used in evaluation because of differences in form and attribute; and the MC environment changes rapidly as the operation tempo increasing. It is an important effort to judge the effectiveness robustness of MC alternative, since both the evaluation data and the MC envi-ronment are full of uncertainty. A robustness evaluation method based on multiple data sources and Monte Carlo simluation is proposed with respect to the characteristics of them. Mainly include Belief map as data expression form; Regression relational model built with Support Vector Re-gression (SVR) to acquire simulation data’s confidence with test bed data as training example; Extensive Bayesian Algo-rithm (EBA) to fuse data from multiple sources; Beta distri-bution fitting method for each criterion of each alternative by using the fused results; and calculation of the Probability of Best (PoB) of each alternative through Monte Carlo simu-lation. Take MCE evaluation of a Naval Vessels Fleet as an example, the proposed method is compared with some gen-eral methods. The results indicate that the proposed method helps to obtain relatively conservative alternative and is effective in guaranteeing the robustness.

Бесплатно

Rough Set and Genetic Based Approach for Maximization of Weighted Association Rules

Rough Set and Genetic Based Approach for Maximization of Weighted Association Rules

Shrikant Brajesh Sagar, Akhilesh Tiwari

Статья научная

The present paper proposes a new approach for the effective weighted association rule mining. The proposed approach utilizes the power of Rough Set Theory for obtaining reduct of the targeted dataset. Additionally, approach takes the benefit for weighted measures and the Genetic Algorithm for the generation of the desired set of rules. Enough analysis of proposed approach has been done and observed that the approach works as per the expectation and will be beneficial in situation when there is a requirement for the consideration of hidden rules(maximizing generated rules) in decision-making process.

Бесплатно

Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)

Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)

Enesi F. Aminu, Olaide N. Oyelade, Ibrahim S. Shehu

Статья научная

Social network sites have become de factor in fostering human relationships and business prospects. Several social networks abound with little interoperability functionality that enables exchange of profiles of users. Though, proprietary Application Programming Interfaces (APIs) are provided as endpoints for applications in retrieval of user profile. Moreover, semantic web Friend of a Friend (FOAF) is now been used as a medium for realizing semantic social networks to be able to share user's profile across sites. And since the goal of semantic web is to provide autonomous data centric system coupled on ontology and reasoning, we propose a novel communication protocol named iProc, and usable by autonomous agents that relies on the distributive nature of social network data in coalescing a virtually centralized social network and as well providing means to enlarge user's connectivity to other users across different sites. This paper presents the architecture for a proposed iProc. Furthermore, an implementation of the FOAF files to be used was carried out and discussed.

Бесплатно

Rural Empowerment through Education: Case Study of a Learning Community Telecentre in Indonesia

Rural Empowerment through Education: Case Study of a Learning Community Telecentre in Indonesia

Wichitra Yasya

Статья научная

This research aims to investigate the impact of information and communication technologies (ICTs) for development and social change in a rural telecentre in Indonesia. It attempts to contribute to the literature of ICTs for development and social change, in the field of analysis of a community-driven ICTs initiative and the analysis of an Indonesian telecentre, two research areas that had not been extensively explored. A qualitative case study approach was chosen to reveal the how ICTs are used in community empowerment in the case of Qaryah Thayyibah Learning Community, a school with a telecentre that in founded, run and funded by the community of Kalibening Village in Central Java, Indonesia. Through the application of the stakeholder theory, significant findings related to impact of ICTs for social change of the Qaryah Thayyibah Learning Community were revealed. These findings include patterns of access and participation of stakeholders in relation to ICTs. While ICTs had impacted the students of Qaryah Thayyibah, its impact had not yet been significantly experienced for the wider community outside of the school. Another important finding that emerged from the stakeholder analysis is the influence and value of the local champion in the establishment and sustainability of the ICTs initiative. In conclusion, the findings suggest that education such as that practiced in the Qaryah Thayyibah Learning Community can contribute in achieving rural empowerment, although the process may be long and complex. As this is an exploratory study investigating unquantifiable intangible impacts, further research can focus more on these intangible impacts through different lenses such as culture, power dynamics and social relations.

Бесплатно

SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)

SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)

Somdip Dey

Статья научная

This paper presents a new combined symmetric key cryptographic technique, which is generally an amalgamation of Bit Manipulation, generalized Modified Vernam Cipher, Single Bit Manipulation and Modified Caesar Cipher. The technique proposed here is basically an advanced and upgraded module of SD-AREE cryptographic method, which is based on Modified Caesar Cipher along with Bit Manipulation and the SD-AREE module is very useful in excluding any repetition pattern from a message that is to be encrypted. The proposed method, SD-AREE-I Cipher, is a complete cipher method and unlike its predecessor, SD-AREE, does not need to be added to other cryptographic methods to make those methods stronger. SD-AREE-I method is used to encrypt/decrypt different file formats and the results were very satisfactory. This method is unique and strong because the method contains feedback mechanism and generates new encrypted output every time even with slightest change in the input file (message). The proposed method can also be used for network security.

Бесплатно

STEM Project for Vehicle Image Segmentation Using Fuzzy Logic

STEM Project for Vehicle Image Segmentation Using Fuzzy Logic

Serhiy Balovsyak, Oleksandr Derevyanchuk, Vasyl Kovalchuk, Hanna Kravchenko, Yuriy Ushenko, Zhengbing Hu

Статья научная

A STEM project was implemented, which is intended for students of technical specialties to study the principles of building and using a computer system for segmentation of images of railway transport using fuzzy logic. The project consists of 4 stages, namely stage #1 "Reading images from video cameras using a personal computer or Raspberry Pi microcomputer", stage #2 "Digital image pre-processing (noise removal, contrast enhancement, contour selection)", stage #3 "Segmentation of images", stage #4 "Detection and analysis of objects on segmented images by means of fuzzy logic". Hardware and software tools have been developed for the implementation of the STEM project. A personal computer and a Raspberry Pi 3B+ microcomputer with attached video cameras were used as hardware. Software tools are implemented in the Python language using the Google Colab cloud platform. At each stage of the project, students deepen their knowledge and gain practical skills: they perform hardware and software settings, change program code, and process experimental images of vehicles. It is shown that the processing of experimental images ensures the correct selection of meaningful parts in images of vehicles, for example, windows and number plates in images of locomotives. Assessment of students' educational achievements was carried out by testing them before the start of the STEM project, as well as after the completion of the project. The topics of the test tasks corresponded to the topics of the stages of the STEM project. Improvements in educational achievements were obtained for all stages of the project.

Бесплатно

SXP: Simplified Extreme Programing Process Model

SXP: Simplified Extreme Programing Process Model

Faiza Anwer, Shabib Aftab

Статья научная

Extreme programming is one of the widely used agile models in the software industry. It can handle unclear and changing requirements with the good level of customer satisfaction. However Lack of documentation, poor architectural structure and less focus on design are its major drawbacks that affects its performance. Due to these problems it cannot be used for all kinds of projects. It is considered suitable for small and low risk projects. It also has some controversial practices that cannot be applied in each and every situation like pair programming and on-site customer. To overcome these limitations a modified version of XP called “Simplified Extreme Programming” is proposed in this paper. This model provides solution of these problems without affecting simplicity and agility of extreme programming.

Бесплатно

Scheduling of Generating Unit Commitment by Quantum-Inspired Evolutionary Algorithm

Scheduling of Generating Unit Commitment by Quantum-Inspired Evolutionary Algorithm

Ebrahim Zare juybari, Seyed Mehdi Hosseini

Статья научная

An Quantum-Inspired Evolutionary Algorithm (QEA) is presented for solving the unit commitment problem. The proposed method has been used to achieve the schedule of system units by considering optimal economic dispatch. The QEA method based on the quantum concepts such as Q-bit, present a better population diversity compared with previous evolutionary approaches, and uses quantum gates to achieve better solutions. The proposed method has been tested on a system with 10 generating units, and the results shows the effectiveness of algorithm compared with Other previous references. Furthermore, it can be used to solve the large-scale generating unit commitment problem.

Бесплатно

Scientific Approach of Prediction for Professions Using Machine Learning Classification Techniques

Scientific Approach of Prediction for Professions Using Machine Learning Classification Techniques

Snehlata Barde, Sangeeta Tiwari, Brijesh Patel

Статья научная

Astrology is a very ancient and traditional method of prediction that increases the interest of people continuously. The globe today, there are no common guidelines or principles for astrological prediction. Rather than setting universal principles and criteria for astrological prediction, astrologers focus on providing high-quality services to individuals but there is no guarantee of accuracy. Machine learning is providing the best result for analysis and prediction on many applications by the learning of computers. Prediction and classification make it possible for any learner to work on large, noisy, and complex datasets. The main motive of the paper is to introduce a scientific approach that reduces the drawback of the traditional approach and indicates the universal rules of prediction and proves the validity of astrology by the three classification techniques, Naïve Bayes, Logistic-R, and J48. It is a part of supervision learning that operates with cross-validation 10,12, and 14fold for calculating the terms 1) correctly classified instances (CCI), erroneously categorized instances (ECI), Mean absolute error (MAE), Root mean squared error (RMSE), and Relative absolute error (RAE). 2) True Positive Rate, False Positive Rate, Precision, and F-Measure values. 3) The MCC, ROC, and PRC area values. 4) To calculate the average weight of the three-class label professor, businessman, and doctor in terms of true positive rate, false-positive rate, precision, F-measure, PRC, and ROC area, 5) finally, we calculated the accuracy of each classification technique and compare which provide the better result. For this, we have collected the date of birth, place of birth, and time of birth of 100 persons who belong to different professions. 40 data of professors, 30 data of businessmen, and 30 data of doctors, prepare the horoscope of an individual with the help of software. For analysis, we create the datasheet in .csv format and apply this data sheet in the weka tool to check various parameters and the accuracy percentage of each classifier.

Бесплатно

Scrum with the spices of agile family: a systematic mapping

Scrum with the spices of agile family: a systematic mapping

Sara Ashraf, Shabib Aftab

Статья научная

Agile mania has revolutionized the software industry. Scrum, being a widely adopted mainstream production process, has dominated other Agile family members. Both industrial and academic researchers eagerly tailored and adapted the Scrum framework in quest of software process improvement. Their burning desire for innovation drive them to integrate other software development models with it to leverage the forte of all the models combined and stifle the weaknesses. This paper aims at providing state-of-the-art insightful understanding of how practices from different Agile process models have been plugged into the Scrum framework to bring about improvements in different extents of development that ensued enhanced productivity, and product quality. To gain the in-depth perception, a systematic mapping study has been planned. This study will identify researches on hybrid models of Scrum within agile family, published between 2011 and 2017. Subsequently, these hybrid models of Scrum will be examined broadly by classifying and thematically analyzing the literature, and outcomes will be presented. This study will contribute a latest coarse-grained overview that in turn may guide researchers for future research endeavors.

Бесплатно

Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

Adeel Rafiq, Bilal Ahsan

Статья научная

Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi, everyone can access the internet using wireless connectivity. A major issue in wireless connectivity is the low level of encryption and low security. This might be a security risk for the sensitive data available on the cloud. There are mobile augmented reality systems based on cloud computing, we want to propose a dynamic framework for the security of cloud and live update data on cloud.

Бесплатно

Security Improvement of Object Oriented Design using Refactoring Rules

Security Improvement of Object Oriented Design using Refactoring Rules

Suhel Ahmad Khan, Raees Ahmad Khan

Статья научная

The main component of study is to confirm that how developed security model are helpful for security improvement of object oriented designs. Software refactoring is an essential activity during development and maintenance. It promotes the reengineering measures for improving quality and security of software. The researcher made an effort in this regard to develop security improvement guideline using refactoring activities for object oriented deign. The developed guidelines are helpful to control design complexity for improved security. A case study is adopted from refactoring example by fowler to implement the Security Improvement Guidelines (SIG). The developed Security Quantification Model (SQMOODC) is being used to calculate the quantified value of security at each step. The proposed model SQMOODC calculates the effective security index by ensuring that revised version of object oriented design is being influenced through security improvement guidelines. There is some possibility that original code segment may have some security flaws, anomalies and exploitable entities or vulnerable information that may influence security at design stage. SIG is helpful to cease the security flaws, anomalies, exploitable entities into refactored code segment. Each refactored steps of case study match the prediction of the impact for refactoring rules on security and the impact study for security through SQMOODC model legalize the effectiveness of developed model and security improvement guidelines. The validated results of statistical analysis with different case studies of object oriented designs reflect the usefulness and acceptability of developed models and guidelines.

Бесплатно

Журнал