Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

A Review of Knowledge Management Based Career Exploration System in Engineering Education

A Review of Knowledge Management Based Career Exploration System in Engineering Education

Varekan Keishing, S. Renukadevi

Статья научная

Knowledge sharing has become an important tool in every organization's success story today. Various knowledge management applications has been carried out recently in many sector like health care, university, banking, construction etc. and it has brought significant improvements. However minimal research is done on career development and as such Knowledge management in career exploration in Engineering Education has not been carried out till date. In India, most of the curriculum and pedagogy does not suit with the real time job environment and this caused many graduates to remain unemployed every year. To meet the gap, this paper attempts to highlight the works on the various existing career exploration and knowledge management techniques. The author collected relevant literature from 2010 to 2015 with the objective to find out a way to combine the two disciplines of career exploration and knowledge management to enhance the career awareness and career exploration system with the application of knowledge management techniques. From the study, the researcher found four conclusions: (i). Education and work/career are separated into different world; (ii). Career exploration enhances student's career awareness; (iii). Knowledge management technique adds efficiency and enhances curriculum; (iv). The research efforts in knowledge management (KM) and career exploration are sparse and no such literatures are available on knowledge management in career exploration currently. This research may add to the development of an efficient knowledge management based career exploration system for engineering education.

Бесплатно

A Review of NBTI Degradation and its Impact on the Performance of SRAM

A Review of NBTI Degradation and its Impact on the Performance of SRAM

Umesh Dutta, M.K Soni, Manisha Pattanaik

Статья научная

Temporal degradation of VLSI design is a major reliability concern for highly scaled silicon IC technology. Negative Bias Temperature Instability (NBTI) in particular is a serious threat affecting the performance of both digital and analog circuits with time. This paper presents a review of NBTI degradation, its mechanism and various factors that affect the degradation caused by NBTI. Reaction Diffusion (RD) model based analytical expressions developed by various researchers are also discussed along with their features and underlying assumptions. Degradation in the Static RAM (SRAM) performance caused by NBTI is also discussed in detail along with the strategies that are employed to combat the effect of NBTI degradation in SRAM. Results of the review done for SRAM cell under NBTI degradation suggests that these design strategies are effective in improving the SRAM cell performance.

Бесплатно

A Review on the Suitability of Machine Learning Approaches to Facial Age Estimation

A Review on the Suitability of Machine Learning Approaches to Facial Age Estimation

Olufade F.W. Onifade, Damilola J. Akinyemi

Статья научная

Age is a human attribute which grows alongside an individual. Estimating human age is quite difficult for machine as well as humans, however there has been and are still ongoing efforts towards machine estimation of human age to a high level of accuracy. In a bid to improve the accuracy of age estimation from facial image, several approaches have been proposed many of which used Machine Learning algorithms. The several Machine Learning algorithms employed in these works have made significant impact on the results and of performances of the proposed age estimation approaches. In this paper, we examined and compared the performance of a number of Machine Learning algorithms used for age estimation in several previous works. Considering two publicly available facial ageing datasets (FG-NET and MORPH) which have been mostly used in previous works, we observed that Support Vector Machine (SVM) has been most popularly used and a combination/hybridization of SVM for classification (SVC) and regression (SVR) have shown the best performance so far. We also observed that the face modelling or feature extraction techniques employed significantly impacted the performance of age estimation algorithms.

Бесплатно

A Routing Priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks

A Routing Priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks

Liyong Bao, Dongfeng Zhao, Yifan Zhao

Статья научная

Based on the ideas of conflict-free transmission, priority to guarantee transmission quality for communication between the different clusters , this article proposes a scheduling Algorithm fit for the MAC scheme of WSNs, which has made it possible for the polling service capable of differentiating services of the cluster head node of two priority levels. The high-priority service of the cluster head is responsible for routing between the different clusters, via exhaustive service policy, while the low-priority services of the cluster head node, for communication within the cluster through limited service policy with good fairness. The theoretical model of this scheme is established through Markov chain and probability generating function. Mathematical analysis is made on the mean queue length, the mean inquiry cyclic time and the mean delay time. It turns out that the findings from theoretical analysis correspond well with those from simulated experiments.

Бесплатно

A Scheme for Evaluating XML Engine on RDBMS

A Scheme for Evaluating XML Engine on RDBMS

Guannan Si, Zhengji Zhou, Nan Li, Jing Xu, Jufeng Yang

Статья научная

There are an increasing number of DBMS vendors thinking of integrating XML data management into traditional relational database, with wider use of XML. In this case, a comprehensive evaluation methodology is needed to evaluate the XML engine in RDBMS correctly. In this paper, we analyze the characteristics of XML engine and propose an evaluation strategy of XML engine in a RDBMS. We believe that the evaluation should include functional evaluation and performance evaluation, and cover several major aspects of DB such as storage, query and update. Then we designed an evaluation scheme for the XML engine in RDBMS according the strategy. The scheme describes an evaluation scene and contains a data set, workload and index set. The data set reflects the characteristics of both data-centric and document-centric XML data. The workload covers all of the requirements of XQuery in W3C. The index set covers the aspects of storage, indexing, query and update. In the end, we complete an experiment to test an actual computer system using the proposal. The result shows that the proposal is proper.

Бесплатно

A Scheme to Reduce Response Time in Cloud Computing Environment

A Scheme to Reduce Response Time in Cloud Computing Environment

Ashraf Zia, M.N.A. Khan

Статья научная

The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and betterresource management. These challenges are caused by the infrastructure services provided by various cloud vendors on need basis. Empirical studies on cloud computing report that existing quality of services solutions are not enough as well as there are still many gaps which need to be filled. Also, there is a dire need to develop appropriate frameworks to improve response time of the clouds. In this paper, we have made an attempt to fill this gap by proposing a framework that focuses on improving the response time factor of the QoS in the cloud environment such as reliability and scalability. We believe that if the response time are communicating effectively and have awareness of the nearest and best possible resource available then the remaining issues pertaining to QoS can be reduced to a greater extent.

Бесплатно

A Secure Framework for Discovering the Liabilities of a Network Server

A Secure Framework for Discovering the Liabilities of a Network Server

Ulya Sabeel, Saima Maqbool

Статья научная

The role of network and information systems is increasing in our day today infrastructures that provide critical services like banking and commerce applications, telecommunications, distribution, transportation, etc. This increases the levels of dependability on such applications, which brings about several pros and cons as well. If these infrastructures are damaged, it can compromise the availability of the critical services. Thus, it is the need of the hour to secure the available network and information systems from malicious attacks. In this paper, we have proposed a secure technique named as Network Liability Detection (NLD) and a software we named as Network Liability Tool (NLT), that points out the liabilities or vulnerabilities of your system that can be exploited to compromise its security. We propose a model based approach where the behavior of each component of the system is carefully monitored to find out the well known as well as as-yet-unknown loopholes in the system. A prototype of the application is built in Windows Platform using Java, to demonstrate the entire functioning of this system and helps in solving the security related loopholes in the network servers. The speculative results affirm that the proposed technique is effective in detecting the liabilities of the network servers.

Бесплатно

A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture

A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture

Ruisong Ye, Shaojun Zeng, Junming Ma, Chuting Lai

Статья научная

A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, then 2D skew tent map is utilized to generate chaotic sequences, which are used for both permutation process and substitution process. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plaintext sensitivity. The substitution process is first initiated with the initial vectors generated by the cipher keys and 2D skew tent map, then the gray values of row and column pixels of 2D image matrix are mixed with the pseudorandom number sequences via bitxoring operation. Both permutation process and substitution process are executed row-by-row and column-by-column instead of pixel-by-pixel to improve the speed of encryption. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption/decryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.

Бесплатно

A Study and Review on the Development of Mutation Testing Tools for Java and Aspect-J Programs

A Study and Review on the Development of Mutation Testing Tools for Java and Aspect-J Programs

Pradeep Kumar Singh, Om Prakash Sangwan, Arun Sharma

Статья научная

Mutation analysis in software testing is observed as the most effective way to validate the software under inspection. In last decade, number of researchers developed various methods and tools to apply mutation testing on Aspect Oriented Programs. In this paper, authors analyzed numerous mutation testing based tools available to test the Java and AspectJ programs. All effective and popular Aspect-J testing tools have been considered and analyzed in this paper, based on essential requirements in this context, considered to be fulfilled by testing tools decided by testing professional and researchers for such tools. This paper analyzed the work progress in the field of mutation testing techniques and tools specific to Java and AspectJ. This work considered essential parameters on which the analysis of analyzed tools is carried out. In case of addition parameters considered for evaluation, some of the resultant metrics may vary slightly under modification in basic requirements. Based on the numeric value estimated, it is finally suggested the merits of a mutation tool under different circumstances. This is the extension of the work carried by us in previous review for aspect based mutation testing techniques.

Бесплатно

A Study of Black Hole Attack on MANET Performance

A Study of Black Hole Attack on MANET Performance

C. K. Nagpal, Chirag Kumar, Bharat Bhushan, Shailender Gupta

Статья научная

Mobile Ad hoc Network (MANET) is a self-organized wireless network, consisting of nodes (mobile devices) responsible for its creation, operation and maintenance. The communication in the MANET is of multihop in nature due to absence of any fixed infrastructure. An attacker may intrude easily into MANET by posing as legitimate intermediate node and present various types of security attacks on data exchanges taking place between source and destination. In this paper we study the impact of presence of black hole node on MANET performance on the basis of reachability, hop count, neighbor node density and path optimality. We observe that as the percentage of black hole nodes increases, the MANET performance degrades significantly.

Бесплатно

A Study of Creativity of Secondary School Children as a Correlate of Some Television Viewing Habits

A Study of Creativity of Secondary School Children as a Correlate of Some Television Viewing Habits

Ravi Kant

Статья научная

The present study was undertaken to study of creativity in relation to TV viewing habits of secondary school students. The sample consists of 400 secondary school students of Rampur city. Verbal test of creativity and TV viewing habits questionnaire were used for this investigation. The result of this study shows that on some behalf TV viewing is negatively related to creativity but overall TV viewing is positively related to creativity of secondary school students. Students viewed variety type program on TV however they were low achiever or high achiever gain knowledge and information through TV. In this study relationship between creativity and TV viewing was positive overall but non significant.

Бесплатно

A Study of Sentiment and Trend Analysis Techniques for Social Media Content

A Study of Sentiment and Trend Analysis Techniques for Social Media Content

Asad Mehmood, Abdul S. Palli, M.N.A. Khan

Статья научная

The social media networks have evolved rapidly and people frequently use these services to communicate with others and express themselves by sharing opinions, views, ideas etc. on different topics. The social media trend analysis is generally carried out by sifting the corresponding or interlinked events discussed on social media websites such as Twitter, Facebook etc. The fundamental objective behind such analyses is to determine the level of criticality with respect to criticism or appreciation described in the comments, tweets or blogs. The trend analysis techniques can also be systematically exploited for opinion making among the masses at large. The results of such analyses show how people think, assess, orate and opine about different issues. This paper primarily focuses on the trend detection and sentiment analysis techniques and their efficacy in the contextual information. We further discuss these techniques which are used to analyze the sentiments expressed within a particular sentence, paragraph or document etc. The analysis based on sentiments can pave way for automatic trend analysis, topic recognition and opinion mining etc. Furthermore, we can fairly estimate the degree of positivity and negativity of the opinions and sentiments based on the content obtained from a particular social media.

Бесплатно

A Study of Time Series Models ARIMA and ETS

A Study of Time Series Models ARIMA and ETS

Er. Garima Jain, Bhawna Mallick

Статья научная

The aim of the study is to introduce some appropriate approaches which might help in improving the efficiency of weather’s parameters. Weather is a natural phenomenon for which forecasting is a great challenge today. Weather parameters such as Rainfall, Relative Humidity , Wind Speed , Air Temperature are highly non-linear and complex phenomena, which include statistical simulation and modeling for its correct forecasting. Weather Forecasting is used to simplify the purpose of knowledge and tools which are used for the state of atmosphere at a given place. The expectations are becoming more complicated due to changing weather state. There are different software and their types are available for Time Series forecasting. Our aim is to analyze the parameter and do the comparison of some strategies in predicting these temperatures. Here we tend to analyze the data of given parameters and to notice their predictions for a particular period by using the strategy of Autoregressive Integrated Moving Average (ARIMA) and Exponential Smoothing (ETS) .The data from meteorological centers has been taken for the comparison of methods using packages such as ggplot2, forecast, time Date in R and automatic prediction strategies which are available within the package applied for modeling with ARIMA and ETS methods. On the basis of accuracy we tend to attempt the simplest methodology and then we will compare our model on the basis of MAE, MASE, MAPE and RMSE. An identification of model will be the chromatic checkup of both the ACF and PACF to hypothesize many probable models which are going to be projected by selection criteria i.e. AIC, AICc and BIC.

Бесплатно

A Study on Discrete Model of Three Species Syn-Eco-System with Limited Resources — (One Period Equilibrium States)

A Study on Discrete Model of Three Species Syn-Eco-System with Limited Resources — (One Period Equilibrium States)

B. Hari Prasad

Статья научная

In this paper, the system comprises of a commensal (S1), two hosts S2 and S3 ie., S2 and S3 both benefit S1, without getting themselves effected either positively or adversely. Further S2 is a commensal of S3, S3 is a host of both S1, S2 and all the three species have limited resources. The basic equations for this model constitute as three first order non-linear ordinary difference equations. All possible equilibrium points are identified based on the model equations and criteria for their stability are discussed. Further the numerical solutions are computed for specific values of the various parameters and the initial conditions.

Бесплатно

A Study on the Role of Motivation in Foreign Language Learning and Teaching

A Study on the Role of Motivation in Foreign Language Learning and Teaching

Abbas Pourhosein Gilakjani, Lai-Mei Leong, Narjes Banou Sabouri

Статья научная

Motivation has been called the “neglected heart” of language teaching. As teachers, we often forget that all of our learning activities are filtered through our students’ motivation. In this sense, students control the flow of the classroom. Without student motivation, there is no pulse, there is no life in the class. When we learn to incorporate direct approaches to generating student motivation in our teaching, we will become happier and more successful teachers. This paper is an attempt to look at EFL learners’ motivation in learning a foreign language from a theoretical approach. It includes a definition of the concept, the importance of motivation, specific approaches for generating motivation, difference between integrative and instrumental motivation, difference between intrinsic and extrinsic motivation, factors influencing motivation, and adopting motivational teaching practice.

Бесплатно

A Supervised Approach for Automatic Web Documents Topic Extraction Using Well-Known Web Design Features

A Supervised Approach for Automatic Web Documents Topic Extraction Using Well-Known Web Design Features

Kazem Taghandiki, Ahmad Zaeri, Amirreza Shirani

Статья научная

The aim of this paper is to propose an efficient method for identification of web document topics which is often considered as one of the debatable challenges in many information retrieval systems. Most of the previous works have focused on analyzing the entire text using time-consuming methods and also many of them have used unsupervised approaches to identify the main topic of documents. However, in this paper, it is attempted to exploit the most widely-used Hyper-Text Markup Language (HTML) features to extract topics from web documents using a supervised approach. Hiring an interactive crawler, we firstly try to analyze HTML structures of 5000 webpages in order to identify the most widely-used HTML features. In the next step, the selected features of 1500 webpages are extracted using the same crawler. Suitable topics are given to each web document by users in a supervised learning process. A topic modeling technique is used over extracted features to build four classifiers- C4.5, Decision Tree, Naïve Bayes and Maximum Entropy- which are separately adopted to train and test our data. The results of classifiers are compared and the high accurate classifier is selected. In order to examine our approach in a larger scale, a new set of 3500 web documents is evaluated using the selected classifier. Results show that the proposed system provides remarkable performance which is able to obtain 71.8% recognition rate.

Бесплатно

A Survey for Replica Placement Techniques in Data Grid Environment

A Survey for Replica Placement Techniques in Data Grid Environment

Alireza Souri, Amir masoud Rahmani

Статья научная

In data grids, data replication on variant nodes can change some problems such as response time and availability. Also, in data replication, there are some challenges to finding the best replica efficiently in relation to performance and location of physical storage systems. In this paper, various replica placement strategies are discussed. These replica placement strategies are available in the works. Replica placement contains recognizing the best possible node to duplicate data based on network latency and user request. These strategies measure and analyze different parameters such as access cost, bandwidth consumption, scalability, execution time and storage consumption. This paper also analyses the performance of various strategies with respect to the parameters mentioned above in data grid.

Бесплатно

A Survey on Face Detection and Recognition Techniques in Different Application Domain

A Survey on Face Detection and Recognition Techniques in Different Application Domain

Subrat Kumar Rath, Siddharth Swarup Rautaray

Статья научная

In recent technology the popularity and demand of image processing is increasing due to its immense number of application in various fields. Most of these are related to biometric science like face recognitions, fingerprint recognition, iris scan, and speech recognition. Among them face detection is a very powerful tool for video surveillance, human computer interface, face recognition, and image database management. There are a different number of works on this subject. Face recognition is a rapidly evolving technology, which has been widely used in forensics such as criminal identification, secured access, and prison security. In this paper we had gone through different survey and technical papers of this field and list out the different techniques like Linear discriminant analysis, Viola and Jones classification and adaboost learning curvature analysis and discuss about their advantages and disadvantages also describe some of the detection and recognition algorithms, mention some application domain along with different challenges in this field. . We had proposed a classification of detection techniques and discuss all the recognition methods also.

Бесплатно

A Survey on ICT Education at the Secondary and Higher Secondary Levels in Bangladesh

A Survey on ICT Education at the Secondary and Higher Secondary Levels in Bangladesh

Tushar Kanti Saha, Rubya Shahrin, Uzzal Kumar Prodhan

Статья научная

In this study, we show the status of ICT education and find the gaps between rural and urban institutions for providing ICT education in secondary and higher secondary institutions in Bangladesh. For this purpose, we use primary data collected using a survey questionnaire that is answered by ICT teachers engaged in those institutions. The variables used in the questionnaire are the name of the respondents, educational qualification, locations of the institutions, syllabus structure, the total number of students for ICT courses, number of computers, etc. The data were collected from institutions located in urban and rural areas. We apply several statistical functions along with conditional logic to our data for getting the desired result. We find that the students-teacher ratio in secondary (resp., higher secondary) is about 288:1 (resp., 212:1), existing teachers have a heavy academic workload. We also find that there exist low facilities in rural institutions compared to the urban institutions because students-computer ratio (SCR) is 46 in rural areas whereas SCR is 22 in the urban area. Moreover, we find that more than 80% of the teachers conducting ICT classes have graduated from the discipline other than ICT or related discipline. Furthermore, teachers who cannot complete at least 80% of the ICT syllabus in time are mostly non-ICT graduate. Based on these findings, we propose some recommendations to meet the above gaps of the current ICT education in Bangladesh.

Бесплатно

A Survey on Interoperability in the Cloud Computing Environments

A Survey on Interoperability in the Cloud Computing Environments

Bahman Rashidi, Mohsen Sharifi, Talieh Jafari

Статья научная

In the recent years, Cloud Computing has been one of the top ten new technologies which provides various services such as software, platform and infrastructure for internet users. The Cloud Computing is a promising IT paradigm which enables the Internet evolution into a global market of collaborating services. In order to provide better services for cloud customers, cloud providers need services that are in cooperation with other services. Therefore, Cloud Computing semantic interoperability plays a key role in Cloud Computing services. In this paper, we address interoperability issues in Cloud Computing environments. After a description of Cloud Computing interoperability from different aspects and references, we describe two architectures of cloud service interoperability. Architecturally, we classify existing interoperability challenges and we describe them. Moreover, we use these aspects to discuss and compare several interoperability approaches.

Бесплатно

Журнал