Статьи журнала - International Journal of Modern Education and Computer Science
Все статьи: 1064
A Proposed Model for IT Disaster Recovery Plan
Статья научная
IT disaster recovery planning is no longer an option. Reliable IT services have become an integral part of most business processes. To ensure the continued provision of information technology, firms must engage in IT disaster recovery planning. Surprisingly, there is little research on this topic. IT disaster recovery planning has not been fully conceptualized in mainstream IT research. A previously framework for assessing the degree of IT disaster recovery planning. Practitioners can use this study to guide IT disaster recovery planning. Our Disaster Recovery Plan is designed to ensure the continuation of vital business processes in the event that a disaster occurs. This plan will provide an effective solution that can be used to recover all vital business processes within the required time frame using vital records that are stored off-site. This Plan is just one of several plans that will provide procedures to handle emergency situations. These plans can be utilized individually but are designed to support one another. The first phase is a Functional Teams and Responsibilities the Crisis Management Plan. This phase allows the ability to handle high-level coordination activities surrounding any crisis situation. We will also discuss the development, finally maintenance and testing of the Disaster Recovery Plan.
Бесплатно
A Proposed Modification of K-Means Algorithm
Статья научная
K-means algorithm is one of the most popular algorithms for data clustering. With this algorithm, data of similar types are tried to be clustered together from a large data set with brute force strategy which is done by repeated calculations. As a result, the computational complexity of this algorithm is very high. Several researches have been carried out to minimize this complexity. This paper presents the result of our research, which proposes a modified version of k-means algorithm with an improved technique to divide the data set into specific numbers of clusters with the help of several check point values. It requires less computation and has enhanced accuracy than the traditional k-means algorithm as well as some modified variant of the traditional k-Means.
Бесплатно
A Pure EBMT Approach for English to Hindi Sentence Translation System
Статья научная
The paper focuses on Example Based Machine Translation (EBMT) system that translates sentences from English to Hindi. It uses the parallel corpus for translating sentences. Development of a machine translation (MT) system typically demands a large volume of computational resources. Requirement of computational resources (for example, rules) is much less in respect of EBMT. This makes development of EBMT systems for English to Hindi translation feasible, where availability of large-scale computational resources is still scarce. Example based machine translation relies on the database for its translation. The frequency of word occurrence is important for translation in EBMT in the following research.
Бесплатно
A Quantitative Analysis of Postgraduate Programmes Admission of the Hong Kong Institute of Education
Статья научная
This paper analyzed 8 years' student admission trend of Hong Kong Institute of Education (HKIEd) postgraduate programmes in 2 time slots. In the first time period, year 2007-2010, we use the waterfall and competing pattern model for the quantitative analysis of the postgraduate programmes in a holistic manner of HKIEd, and further study the general student admission trend of year 2011-2013, due to the sharp increase of mainland China students and the 3-3-4 Scheme Education System Reform in 2011 and 2012. In this paper, we utilize this rich collection of programmes to identify usable admission patterns by analyzing admission data of the past years for reinforcing the institute's strength and reputation, whose programme spectrum was expanded and enhanced quite drastically since 2005 with the introduction of 1st Master in Education cohort. In particular, this paper is focused to locate: 1) if there is any internal competition and how severe the competition is. 2) If there is any programme that can be utilized as strategic recruitment? and 3) the general student admission trend of the 8 years. With this study, management can better understand where the sources of applicants come from. New insight can be drawn and new strategy can be defined to recruit more quality students which are also aligned with our strategic move to transform the students. The methods used in this paper can be easily applied in other University for analyzing the admission issues, and can demonstrate to management how operation data can be utilized to form valuable insights and significant improvement can then be made based on these identified facts.
Бесплатно
A Real-time DBMS System for the Immigration Processing of Large Hajj Crowd
Статья научная
Hajj is an important Islamic ritual and one of the five pillars of Islam. The Hajj event occurs in the twelfth month of the Islamic lunar calendar and requires anywhere from two to three millions of Muslims from all over the world to make pilgrimage for 10-15 days to the Holy city of Makkah in the Kingdom of Saudi Arabia. Providing quality Hajj services to such large number of pilgrims has been a significant challenge for the Saudi Arabian authorities. Among other services, immigration processing of a large Hajj pilgrim crowd arriving simultaneously at various Saudi Arabian ports during the specific Hajj days has resulted in significant delays at these ports. Unique and technology based solutions must be explored to alleviate the various Hajj related pilgrim service problems and to improve overall quality of these services. This paper reports experience with the design and development of a prototype backend DBMS system to automate the immigration processing of the large Hajj crowd. A real-time DBMS is considered for meeting the processing requirements of such a large Hajj pilgrim crowd arriving simultaneously at various ports. The purpose of this prototype was to understand the challenges and the feasibility of implementation of the backend system using a real-time DBMS.
Бесплатно
A Recursive Binary Tree Method for Age Classification of Child Faces
Статья научная
This paper proposes an intuitive approach to facial age classification on child faces – a recursive multi-class binary classification tree – using the texture information obtained from facial images. The face area is divided into small regions from which Local Binary Pattern (LBP) histograms were extracted and concatenated into a single vector efficiently representing a facial image. The classification is based on training a set of binary classifiers using Support Vector Machines (SVMs). Each classifier estimates whether the facial image belongs to a specified age range or not until the last level of the tree is reached where the age is finally determined. Our classification approach also includes an overlapping function that resolves overlaps and conflicts in the outputs of two mutually-exclusive classifiers at each level of the classification tree. Our proposed approach was experimented on a publicly available dataset (FG-NET) and our locally obtained dataset (FAGE) and the results obtained are at par with those of existing works.
Бесплатно
A Review of Fully Automated Techniques for Brain Tumor Detection From MR Images
Статья научная
Radiologists use medical images to diagnose diseases precisely. However, identification of brain tumor from medical images is still a critical and complicated job for a radiologist. Brain tumor identification form magnetic resonance imaging (MRI) consists of several stages. Segmentation is known to be an essential step in medical imaging classification and analysis. Performing the brain MR images segmentation manually is a difficult task as there are several challenges associated with it. Radiologist and medical experts spend plenty of time for manually segmenting brain MR images, and this is a non-repeatable task. In view of this, an automatic segmentation of brain MR images is needed to correctly segment White Matter (WM), Gray Matter (GM) and Cerebrospinal Fluid (CSF) tissues of brain in a shorter span of time. The accurate segmentation is crucial as otherwise the wrong identification of disease can lead to severe consequences. Taking into account the aforesaid challenges, this research is focused towards highlighting the strengths and limitations of the earlier proposed segmentation techniques discussed in the contemporary literature. Besides summarizing the literature, the paper also provides a critical evaluation of the surveyed literature which reveals new facets of research. However, articulating a new technique is beyond the scope of this paper.
Бесплатно
A Review of Interventions to Recruit and Retain ICT Students
Статья научная
This article reviews and analyses the educational research literature on interventions to increase the recruitment and retention of information and communications technology (ICT) students. The results show that three changes in computing pedagogy characterize successful interventions, and consequently offer promising ways to attract and prepare more people for careers in ICT. The most important selection criterion considered when choosing papers to review was that interventions had been tested in practice and their effectiveness measured. Interventions were arranged into two groups: recruitment and retention. Recruitment interventions described initiatives to motivate interest in computing among secondary schools students, whereas retention interventions described efforts to retain students in ICT majors at universities. The three pedagogical approaches that emerged from an analysis of the successful interventions were: (1) visual programming environments to teach introductory programming, (2) inquiry learning activities to engage students in computing, and (3) integration of interdisciplinary knowledge to attract students from diverse disciplines. This review draws attention to innovative teaching practices currently shaping computer science education. Wider adoption of these pedagogical strategies has the potential to significantly increase the number of qualified ICT professionals.
Бесплатно
A Review of Knowledge Management Based Career Exploration System in Engineering Education
Статья научная
Knowledge sharing has become an important tool in every organization's success story today. Various knowledge management applications has been carried out recently in many sector like health care, university, banking, construction etc. and it has brought significant improvements. However minimal research is done on career development and as such Knowledge management in career exploration in Engineering Education has not been carried out till date. In India, most of the curriculum and pedagogy does not suit with the real time job environment and this caused many graduates to remain unemployed every year. To meet the gap, this paper attempts to highlight the works on the various existing career exploration and knowledge management techniques. The author collected relevant literature from 2010 to 2015 with the objective to find out a way to combine the two disciplines of career exploration and knowledge management to enhance the career awareness and career exploration system with the application of knowledge management techniques. From the study, the researcher found four conclusions: (i). Education and work/career are separated into different world; (ii). Career exploration enhances student's career awareness; (iii). Knowledge management technique adds efficiency and enhances curriculum; (iv). The research efforts in knowledge management (KM) and career exploration are sparse and no such literatures are available on knowledge management in career exploration currently. This research may add to the development of an efficient knowledge management based career exploration system for engineering education.
Бесплатно
A Review of NBTI Degradation and its Impact on the Performance of SRAM
Статья научная
Temporal degradation of VLSI design is a major reliability concern for highly scaled silicon IC technology. Negative Bias Temperature Instability (NBTI) in particular is a serious threat affecting the performance of both digital and analog circuits with time. This paper presents a review of NBTI degradation, its mechanism and various factors that affect the degradation caused by NBTI. Reaction Diffusion (RD) model based analytical expressions developed by various researchers are also discussed along with their features and underlying assumptions. Degradation in the Static RAM (SRAM) performance caused by NBTI is also discussed in detail along with the strategies that are employed to combat the effect of NBTI degradation in SRAM. Results of the review done for SRAM cell under NBTI degradation suggests that these design strategies are effective in improving the SRAM cell performance.
Бесплатно
A Review on the Suitability of Machine Learning Approaches to Facial Age Estimation
Статья научная
Age is a human attribute which grows alongside an individual. Estimating human age is quite difficult for machine as well as humans, however there has been and are still ongoing efforts towards machine estimation of human age to a high level of accuracy. In a bid to improve the accuracy of age estimation from facial image, several approaches have been proposed many of which used Machine Learning algorithms. The several Machine Learning algorithms employed in these works have made significant impact on the results and of performances of the proposed age estimation approaches. In this paper, we examined and compared the performance of a number of Machine Learning algorithms used for age estimation in several previous works. Considering two publicly available facial ageing datasets (FG-NET and MORPH) which have been mostly used in previous works, we observed that Support Vector Machine (SVM) has been most popularly used and a combination/hybridization of SVM for classification (SVC) and regression (SVR) have shown the best performance so far. We also observed that the face modelling or feature extraction techniques employed significantly impacted the performance of age estimation algorithms.
Бесплатно
A Routing Priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks
Статья научная
Based on the ideas of conflict-free transmission, priority to guarantee transmission quality for communication between the different clusters , this article proposes a scheduling Algorithm fit for the MAC scheme of WSNs, which has made it possible for the polling service capable of differentiating services of the cluster head node of two priority levels. The high-priority service of the cluster head is responsible for routing between the different clusters, via exhaustive service policy, while the low-priority services of the cluster head node, for communication within the cluster through limited service policy with good fairness. The theoretical model of this scheme is established through Markov chain and probability generating function. Mathematical analysis is made on the mean queue length, the mean inquiry cyclic time and the mean delay time. It turns out that the findings from theoretical analysis correspond well with those from simulated experiments.
Бесплатно
A Scheme for Evaluating XML Engine on RDBMS
Статья научная
There are an increasing number of DBMS vendors thinking of integrating XML data management into traditional relational database, with wider use of XML. In this case, a comprehensive evaluation methodology is needed to evaluate the XML engine in RDBMS correctly. In this paper, we analyze the characteristics of XML engine and propose an evaluation strategy of XML engine in a RDBMS. We believe that the evaluation should include functional evaluation and performance evaluation, and cover several major aspects of DB such as storage, query and update. Then we designed an evaluation scheme for the XML engine in RDBMS according the strategy. The scheme describes an evaluation scene and contains a data set, workload and index set. The data set reflects the characteristics of both data-centric and document-centric XML data. The workload covers all of the requirements of XQuery in W3C. The index set covers the aspects of storage, indexing, query and update. In the end, we complete an experiment to test an actual computer system using the proposal. The result shows that the proposal is proper.
Бесплатно
A Scheme to Reduce Response Time in Cloud Computing Environment
Статья научная
The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and betterresource management. These challenges are caused by the infrastructure services provided by various cloud vendors on need basis. Empirical studies on cloud computing report that existing quality of services solutions are not enough as well as there are still many gaps which need to be filled. Also, there is a dire need to develop appropriate frameworks to improve response time of the clouds. In this paper, we have made an attempt to fill this gap by proposing a framework that focuses on improving the response time factor of the QoS in the cloud environment such as reliability and scalability. We believe that if the response time are communicating effectively and have awareness of the nearest and best possible resource available then the remaining issues pertaining to QoS can be reduced to a greater extent.
Бесплатно
A Secure Framework for Discovering the Liabilities of a Network Server
Статья научная
The role of network and information systems is increasing in our day today infrastructures that provide critical services like banking and commerce applications, telecommunications, distribution, transportation, etc. This increases the levels of dependability on such applications, which brings about several pros and cons as well. If these infrastructures are damaged, it can compromise the availability of the critical services. Thus, it is the need of the hour to secure the available network and information systems from malicious attacks. In this paper, we have proposed a secure technique named as Network Liability Detection (NLD) and a software we named as Network Liability Tool (NLT), that points out the liabilities or vulnerabilities of your system that can be exploited to compromise its security. We propose a model based approach where the behavior of each component of the system is carefully monitored to find out the well known as well as as-yet-unknown loopholes in the system. A prototype of the application is built in Windows Platform using Java, to demonstrate the entire functioning of this system and helps in solving the security related loopholes in the network servers. The speculative results affirm that the proposed technique is effective in detecting the liabilities of the network servers.
Бесплатно
Статья научная
A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, then 2D skew tent map is utilized to generate chaotic sequences, which are used for both permutation process and substitution process. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plaintext sensitivity. The substitution process is first initiated with the initial vectors generated by the cipher keys and 2D skew tent map, then the gray values of row and column pixels of 2D image matrix are mixed with the pseudorandom number sequences via bitxoring operation. Both permutation process and substitution process are executed row-by-row and column-by-column instead of pixel-by-pixel to improve the speed of encryption. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption/decryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.
Бесплатно
A Study and Review on the Development of Mutation Testing Tools for Java and Aspect-J Programs
Статья научная
Mutation analysis in software testing is observed as the most effective way to validate the software under inspection. In last decade, number of researchers developed various methods and tools to apply mutation testing on Aspect Oriented Programs. In this paper, authors analyzed numerous mutation testing based tools available to test the Java and AspectJ programs. All effective and popular Aspect-J testing tools have been considered and analyzed in this paper, based on essential requirements in this context, considered to be fulfilled by testing tools decided by testing professional and researchers for such tools. This paper analyzed the work progress in the field of mutation testing techniques and tools specific to Java and AspectJ. This work considered essential parameters on which the analysis of analyzed tools is carried out. In case of addition parameters considered for evaluation, some of the resultant metrics may vary slightly under modification in basic requirements. Based on the numeric value estimated, it is finally suggested the merits of a mutation tool under different circumstances. This is the extension of the work carried by us in previous review for aspect based mutation testing techniques.
Бесплатно
A Study of Black Hole Attack on MANET Performance
Статья научная
Mobile Ad hoc Network (MANET) is a self-organized wireless network, consisting of nodes (mobile devices) responsible for its creation, operation and maintenance. The communication in the MANET is of multihop in nature due to absence of any fixed infrastructure. An attacker may intrude easily into MANET by posing as legitimate intermediate node and present various types of security attacks on data exchanges taking place between source and destination. In this paper we study the impact of presence of black hole node on MANET performance on the basis of reachability, hop count, neighbor node density and path optimality. We observe that as the percentage of black hole nodes increases, the MANET performance degrades significantly.
Бесплатно
A Study of Creativity of Secondary School Children as a Correlate of Some Television Viewing Habits
Статья научная
The present study was undertaken to study of creativity in relation to TV viewing habits of secondary school students. The sample consists of 400 secondary school students of Rampur city. Verbal test of creativity and TV viewing habits questionnaire were used for this investigation. The result of this study shows that on some behalf TV viewing is negatively related to creativity but overall TV viewing is positively related to creativity of secondary school students. Students viewed variety type program on TV however they were low achiever or high achiever gain knowledge and information through TV. In this study relationship between creativity and TV viewing was positive overall but non significant.
Бесплатно
A Study of Sentiment and Trend Analysis Techniques for Social Media Content
Статья научная
The social media networks have evolved rapidly and people frequently use these services to communicate with others and express themselves by sharing opinions, views, ideas etc. on different topics. The social media trend analysis is generally carried out by sifting the corresponding or interlinked events discussed on social media websites such as Twitter, Facebook etc. The fundamental objective behind such analyses is to determine the level of criticality with respect to criticism or appreciation described in the comments, tweets or blogs. The trend analysis techniques can also be systematically exploited for opinion making among the masses at large. The results of such analyses show how people think, assess, orate and opine about different issues. This paper primarily focuses on the trend detection and sentiment analysis techniques and their efficacy in the contextual information. We further discuss these techniques which are used to analyze the sentiments expressed within a particular sentence, paragraph or document etc. The analysis based on sentiments can pave way for automatic trend analysis, topic recognition and opinion mining etc. Furthermore, we can fairly estimate the degree of positivity and negativity of the opinions and sentiments based on the content obtained from a particular social media.
Бесплатно