Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 1096

Study of Recent Charge Pump Circuits in Phase Locked Loop

Study of Recent Charge Pump Circuits in Phase Locked Loop

Umakanta Nanda, Jyotirmayee Sarangi, Prakash Kumar Rout

Статья научная

This paper reviews the design of phase locked loop (PLL) using recently reported charge pump circuits. Lock time, phase noise, lock range and reference spur of each charge pump circuit are investigated. Though improved charge pump circuits are designed recently, their performance is not as effective as the basic charge pump PLL (CP-PLL). Initially the design of PLL using the basic charge pump is completed in this paper and then the PLL using improved charge pumps are redesigned in CMOS 180 nm technology and simulated using Cadence Virtuoso Analog Design Environment. Finally all the charge pumps are compared with respect to the PLL performances. The current starved voltage controlled oscillator (VCO) used for the design of PLL brings about a tuning range of 119.5 MHz to 2.3 GHz. The PLL using different charge pumps produces a lock time which varies from 204 ns to 329 ns. The other parameters like lock range, phase noise and reference spur are also examined.

Бесплатно

Study of Task Scheduling in Cloud Computing Environment Using Soft Computing Algorithms

Study of Task Scheduling in Cloud Computing Environment Using Soft Computing Algorithms

Saurabh Bilgaiyan, Santwana Sagnika, Samaresh Mishra, Madhabananda Das

Статья научная

Cloud computing is a popular computing concept that performs processing of huge volume of data using highly accessible geographically distributed resources that can be accessed by users on the basis of Pay as per Use policy. Requirements of different users may change so the amount of processing involved in such paradigm also changes. Sometimes they need huge data processing. Such highly volumetric processing results in higher computing time and cost which is not a desirable part of a good computing model. So there must be some intelligent distribution of user's work on the available resources which will result in an optimized computing environment. This paper gives a comprehensive survey on such problems and provide a detailed analysis of some best scheduling techniques from the domain of soft computing with their performance in cloud computing.

Бесплатно

Study of performance evaluation of binary search on merge sorted array using different strategies

Study of performance evaluation of binary search on merge sorted array using different strategies

Sherin W. Hijazi, Mohammad Qatawneh

Статья научная

Search algorithm, is an efficient algorithm, which performs an important task that locates specific data among a collection of data. Often, the difference among search algorithms is the speed, and the key is to use the appropriate algorithm for the data set. Binary search is the best and fastest search algorithm that works on the principle of ‘divide and conquer’. However, it needs the data collection to be in sorted form, to work properly. In this paper, we study the efficiency of binary search, in terms of execution time and speed up, by evaluating the performance improvement of the combined search algorithms, which are sorted into three different strategies: sequential, multithread, and parallel using message passing interface. The experimental code is written in ‘C language’ and applied on an IMAN1 supercomputer system. The experimental results show that the decision variables are generated from the IMAN1 supercomputer system, which is the most efficient. It varied for the three different strategies, which applies binary search algorithm on merge sort. The improvement in performance evaluation gained by using parallel code, greatly depends on the size of data set used, and the number of processors that the speed-up of the parallel codes on 2, 4, 8, 16, 32, 64, 128, and 143 processors is best executed, using between a 50,000 and 500,000 dataset size, respectively. Moreover, on a large number of processors, parallel code achieves the best speed-up to a maximum of 2.72.

Бесплатно

Study on Challenges, Opportunities and Predictions in Cloud Computing

Study on Challenges, Opportunities and Predictions in Cloud Computing

Jitendra Singh

Статья научная

Cloud computing is transforming the way IT is owned and utilized in the present day business scenario. Several predictions by the researchers and analytical enterprises have predicted unprecedented growth for this emerging paradigm. This work is an attempt to analyze the cloud future based on the various reports and predictions published recently. We have explored the various opportunities that will drive the cloud growth. We have also highlighted the effect of cloud in Indian and US market. Significance of the study is validated by conducting the Strength, weakness, opportunity, and Threat (SWOT) analysis. Based on the findings, we have identified the intensity of challenges faced by the various types of cloud deployment model. Correspondingly, we have recommended the critical challenges that need to be addressed first, in order to facilitate the cloud in gaining further momentum.

Бесплатно

Study on Extenics Information Fusion Method and It’s Application

Study on Extenics Information Fusion Method and It’s Application

Li Zhong, Wang Ailing, Qi Furong

Статья научная

This paper makes analysis on theories of D-S evidential reasoning, rough sets, and extenic sets; and indicates that there are some similarities among the three theories in defining uncertainty sets. Therefore, it’s feasible to introduce relevant theories and methods of extenics into information fusion and a method of extenics fusion (MEF) is presented as well. The method combines extenic correlation function with Dempster rule and is considered a good solution for problems of evidence collision and BPA function in information fusion method based on D-S evidential reasoning. The simulation test shows that MEF is better than the traditional D-S evidential reasoning and is applicable to assess all kinds of problems. Using the method of this paper to evaluate surface water in one area of Northern China, the results were consistent with the fact.

Бесплатно

Study on Overburden's Destructive Rules Based on Similar Material Simulation

Study on Overburden's Destructive Rules Based on Similar Material Simulation

Ruyu Zheng, Kan Wu, Ru Li

Статья научная

Analysis on the current research status, this article studies on the dynamic subsidence principles of overburden rock strata during coal mining based on similar material simulation test. Close ranged industrial photogram metric system was introduced to collect data. After coordinate transformation, matching and model amendment, dynamic subsidence curves which can be used to analyze the continuity characteristics of overburden subsidence, changes of boundary angle and displacement angle, volume transferring law from rock to surface, etc. were got. The result is useful in further study of the dynamic rule of overburden strata and enriches mining subsidence principles.

Бесплатно

Suitability and Contribution of Agile Methods in Mobile Software Development

Suitability and Contribution of Agile Methods in Mobile Software Development

Asra Khalid, Sobia Zahra, Muhammad Fahad Khan

Статья научная

Boom of mobile app market is phenomenal and so are the challenges for developing these mobile applications. With changing mobile market technology and trends, various technical constraints for building these mobile apps also cropped up with time. Tradition development approaches are unable to tackle these challenges and technical limitations of mobile market. Analyzing this situation researchers have proposed numerous agile practices to develop people oriented mobile app which embrace their changing needs. This paper provides a brief overview of some effective and commonly used agile approaches that adds value to mobile software business. Suitability of these approaches to fit mobile needs is also discussed in this paper. It is suggested that agile innovations offer a solution for mobile applications and examine developer who are in quest of building high quality products.

Бесплатно

Support Vector Machine as Feature Selection Method in Classifier Ensembles

Support Vector Machine as Feature Selection Method in Classifier Ensembles

Jasmina Đ. Novakovic

Статья научная

In this paper, we suggest classifier ensembles that can incorporate Support Vector Machine (SVM) as feature selection method into classifier ensembles models. Consequences of choosing different number of features are monitored. Also, the goal of this research is to present and compare different algorithmic approaches for constructing and evaluating systems that learn from experience to make the decisions and predictions and minimize the expected number or proportion of mistakes. Experimental results demonstrate the effectiveness of selecting features with SVM in various types of classifier ensembles.

Бесплатно

Surface Electromyography Signal Acquisition and Classification Using Artificial Neural Networks (ANN)

Surface Electromyography Signal Acquisition and Classification Using Artificial Neural Networks (ANN)

R.M.P.K. Rasnayake, M.W.P. Maduranga, J.P.D.M. Sithara

Статья научная

An electromyography (EMG) is an analytical tool used to record muscles' electrical activity, which produces an electrical signal proportional to the level of muscle activity. EMG signal plays a vital role in bio-mechatronic engineering for designing intelligent prostheses and other rehabilitation devices. Analysis of EMG signals with powerful and advanced methodologies is an essential requirement in EMG signal processing, as the EMG signal is a complex nonlinear, non-stationary signal in nature. It is required to use advanced signal processing techniques rather than conventional methods to exact EMG signals' features. Fourier transforms (FT) are not the most appropriate tool for analyzing non-stationary signals such as EMG. In this work, we have developed a system that can be useful for disabled persons to get a regular lifestyle using a functioning part of the body. Here, we studied the electrocution gram behavior of human body parts to feature extraction and trained the neural network to simulate the movements of mechanical actuators such as robotic arms. The wavelet transformation has been used to get high-quality feature extraction from electro cardio grapy and develops proper faltering methods for cardio systems' electrical signals. Finally, an artificial neural network (ANN) is used to classify the EMG signals through exacted features. Classification results are presented in this paper.

Бесплатно

Survey on Adverse Effect of Sophisticated Integrated Development Environments on Beginning Programmers' Skillfulness

Survey on Adverse Effect of Sophisticated Integrated Development Environments on Beginning Programmers' Skillfulness

Alaba T. Owoseni, S. A. Akanji

Статья научная

Integrated development environment as a software system that aids programmers in developing software applications quickly and effectively has been perceived to also serve as an inappropriate tool for beginning programmers when it is specially developed with some complex features. This complexity in features as perceived leaves the programmers with a double role of studying complexity found in the environment and the semantics with syntaxes of the concerned programming language. This paper categorizes few of the available integrated development environments based on program building tools that are integrated in them and also considers an experimental survey on their adverse effects on novice programmers by sampling programmers' opinions using closed ended questionnaires. The population was randomly selected from some tertiary institutions in Nigeria. The opinions were statistically analyzed using chi square and based on the analysis, beginning programmers learning strengths are found greatly influenced by the type of integrated development environment used.

Бесплатно

Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm

Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm

Sherin Zafar, M K Soni

Статья научная

The paper comprehends an impending accost of intensifying biometric stationed authentication protocol(BSAP) bestowing meta-heuristic genetic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET. Biometrics are more advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using genetic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our protocol is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and make the network more secure.

Бесплатно

System Design of Supply Chain Management and Thai Food Export to Global Market via Electronic Marketing

System Design of Supply Chain Management and Thai Food Export to Global Market via Electronic Marketing

Thitirath Cheowsuwan, Sudarat Arthan, Supan Tongphet

Статья научная

This paper presents the electronic marketing application for users involved with the food industry in Thailand. The purpose of this research is to study and develop the supply chain management and the Thai food export to global market. Moreover, this project will improve the knowledge entrepreneurship in this industry to export the food products to the world market through the electronic marketing system. This research will be focused in the two provinces of Thailand that are Phrae and Phayao. The sample group of this research includes the food export manufacturers, the raw material suppliers, and the family business trainees. The research methodology exploits the system development process with the cycle of information system development. The process will develop all fundamentals of the system in every part, which are analysis, design, development, installation, performance testing, and user’s application training. According to the study, the sample users demand the chain management system to produce and export their products. The reason is that they need a tool to assist all sectors of stakeholders; upstream, midstream and downstream. As the results, the proposed system provides functionality that covers the needs of all stakeholders, which are the raw material suppliers, the customers (franchise and restaurant), and the managers (manufacturing, procurement, inventory, restaurant, and sales). From the system's efficiency evaluation by our sample group, the proposed system has been given a satisfied result of system performance from all users: the food export manufacturers (good: = 3.64), the raw material suppliers (good: = 3.63), and the family business trainees (good: = 3.63).

Бесплатно

Tangent Search Long Short Term Memory with Aadaptive Reinforcement Transient Learning based Extractive and Abstractive Document Summarization

Tangent Search Long Short Term Memory with Aadaptive Reinforcement Transient Learning based Extractive and Abstractive Document Summarization

Reshmi P. Rajan, Deepa V. Jose, Roopashree Gurumoorthy

Статья научная

Text summarization is the process of creating a shorter version of a longer text document while retaining its most important information. There have been a number of methods proposed for text summarization, but the existing method does not provide better results and has a problem with sequence classification. To overcome these limitations, a tangent search long short term memory with adaptive reinforcement transient learning-based extractive and abstractive document summarization is proposed in this manuscript. In abstractive phase, the features of the extractive summary are extracted and then the optimal features are selected by Adaptive Flamingo Optimization (AFO). With these optimal features, the abstractive summary is generated. The proposed method is implemented in python. For extractive text summarization, the proposed method attains 42.11% ROUGE-1 Score, 23.55% ROUGE-2 score and 41.05% ROUGE-L score using Gigaword. Additionally, 57.13% ROUGE-1 Score, 28.35% ROUGE-2 score and 52.85% ROUGE-L score using DUC-2004 dataset. For abstractive text summarization the proposed method attains 47.05% ROUGE-1 Score, 22.02% ROUGE-2 score and 48.96% ROUGE-L score using Gigaword. Also, 35.13% ROUGE-1 Score, 20.35% ROUGE-2 score and 35.25% ROUGE-L score using DUC-2004 dataset.

Бесплатно

Task-based Approach in College English Teaching of Digital-based Context

Task-based Approach in College English Teaching of Digital-based Context

Ling Jiang, Kai Sun

Статья научная

With the wide employment of modern educational technology, college English teaching is going on a process of replacing traditional educational media with modern ones, which are closely connected with multimedia computers and internet technology to raise its efficiency and quality. However, some problems and challenges still exist in the college English teaching. In order to solve the problems, this article designs a test and collects data to check the effectiveness of the task-based approach within the Internet-assisted multimedia in college English teaching. The results show that Linguistic form was analyzed and practiced with task-based approach which may help the learners notice the linguistic problems and try out new language forms and structures, and that Internet-assisted multimedia has been effective in intriguing learners' interests and greatly enhanced their self-esteem.

Бесплатно

Taxonomy learning from health care social communities to improve EHR implementation

Taxonomy learning from health care social communities to improve EHR implementation

Zahia Marouf, Sidi Mohamed Benslimane

Статья научная

In this paper, we propose an approach to extract ontological structures from datasets generated by health care users of social networking sites. The objective of this approach is to exploit the user generated implicit semantics as a complement to more formalized knowledge representations. We aim for this latter to leverage the adoption level of the Electronic Health Record systems that are complaining from the shortage in standards and controlled vocabularies.

Бесплатно

Teachers’ Use of Technology and Constructivism

Teachers’ Use of Technology and Constructivism

Abbas Pourhosein Gilakjani, Lai-Mei Leong, Hairul Nizam Ismail

Статья научная

Technology has changed the way we teach and the way we learn. Many learning theories can be used to apply and integrate this technology more effectively. There is a close relationship between technology and constructivism, the implementation of each one benefiting the other. Constructivism states that learning takes place in contexts, while technology refers to the designs and environments that engage learners. Recent efforts to integrate technology in the classroom have been within the context of a constructivist framework. The purpose of this paper is to examine the definition of constructivism, incorporating technology into the classroom, successful technology integration into the classroom, factors contributing to teachers’ use of technology, role of technology in a constructivist classroom, teacher’s use of learning theories to enable more effective use of technology, learning with technology: constructivist perspective, and constructivism as a framework for educational technology. This paper explains whether technology by itself can make the education process more effective or if technology needs an appropriate instructional theory to indicate its positive effect on the learner.

Бесплатно

Teaching Cyber Security Course in the Classrooms of NMIMS University

Teaching Cyber Security Course in the Classrooms of NMIMS University

Prathamesh Churi, N. T. Rao

Статья научная

The paper aims at implementing new pedagogy and assessment practices from rigorous literature survey perusing quality papers and articles. The appropriate pedagogy and relevant assessment always go hand in hand. One cannot achieve effective teaching by compromising the other component. In engineering, pedagogy and assessment play extremely important roles. In recent years, engineering education has lost track of the big picture of what the curriculum has to be. In Computer Science Engineering, the course contents often change according to the demands for new technology in the market. Adhering to this fact, the courses must be designed either practical-based or case study based. Rote teaching-learning methods are not as effective as far as the curriculum design in the computing field is concerned. Cyber Security is one such course where students are expected to learn how to create a protective environment for computing and computing resources. The course must be designed in such a way that, students must learn how to identify the vulnerabilities in computing resources and methodologies to mitigate them. This course aims such that students must learn some popular attacks which help them to identify what are the possible ways from where the attacks could happen. The paper makes use of strategic assessment tools for the Cyber Security course (Taught to post-graduation students) and discusses outcomes through course outcome attainment analysis as per the threshold value of attainment set by the Computer Engineering Department to adhere to the accreditation standards. Through course attainment analysis it is observed that, Viva voce assessment tool is not suitable for evaluation of the course as it does not impose the technical details and working of Cyber Security concepts. The overall attainment was 55.55% which is 15% less than the threshold set by Computer Engineering Department.

Бесплатно

Teaching Programming Courses Online using Cloud System: Practices and Future Challenges

Teaching Programming Courses Online using Cloud System: Practices and Future Challenges

Lakshmanan Senthilkumar

Статья научная

Acceptance of cloud systems as the future has given way to a large number of cloud application installations. They have their presence across domains be it banking, gaming, education and others. A cloud based solution brings down the cost of ownership and maintenance for the host organization. For the users a resilience to use any type of end device being it a workstation, laptop, netbook or even a smartphone to access the application. A typical cloud based LMS was developed with appropriate pedagogy to teach programming courses. Necessary software required are made available on the cloud, with a bare minimum hardware spec requirement at the user end. The paper highlights the adaptability to such pure online course by the students and their learning outcomes. The paper also discusses the issues and challenges both in terms of technology and pedagogy which needs to be addressed when such online courses are planned.

Бесплатно

Teaching artificial intelligence and robotics to undergraduate systems engineering students

Teaching artificial intelligence and robotics to undergraduate systems engineering students

Luis Emilio Alvarez-Dionisi, Mitali Mittra, Rosbelia Balza

Статья научная

The skills of artificial intelligence (AI) and robotics provide a wide window of job opportunities for the following professionals: computer scientists, mechanical engineers, system engineers, computer engineers, biomedical engineers, and electrical engineers. Additionally, other professionals benefiting from AI and robotics’ job opportunities are information technologists, informatic engineers, electronic engineers, data scientists, industrial engineers, big data engineers, and related specialists in the dynamic field of engineering robotics. Therefore, the purpose of this research was to study the effort of teaching AI and robotics to undergraduate systems engineering students at the Polytechnic University Institute “Santiago Mariño” in Barinas, Venezuela. Consequently, the methodology used in this academic research was the case study approach, which included three phases, namely Initiation Phase, Fieldwork Phase, and Closing Phase. In that sense, the design of research adopted in this study was based on the development of an exploratory single case study method. As a result, the Theoretical Framework created as a cornerstone of this research highlighted the following three research variables: (1) Robotic Applications, (2) Mechanics of Robotic Manipulation and Computer Vision, and (3) Object-oriented Analysis and Design (OOAD) and Object-oriented (OO) High-level Programming Languages. In conclusion, two nondirectional null hypotheses were tested, leading to the positive answers of the following research questions: (1) “Can undergraduate systems engineering students apply OOAD and OO High-level Programming Languages to analyze, design, and develop Robotic Applications?” and (2) “Can undergraduate systems engineering students use Mechanics of Robotic Manipulation and Computer Vision to analyze, design, and develop Robotic Applications?” as stated in this case study.

Бесплатно

Test Bank Management System Applying Rasch Model and Data Encryption Standard (DES) Algorithm

Test Bank Management System Applying Rasch Model and Data Encryption Standard (DES) Algorithm

Maria Ellen L. Estrellado, Ariel M. Sison, Bartolome T. Tanguilig III

Статья научная

Online examinations are of great importance to education. It has become a powerful tool for evaluating students' knowledge and learning. Adopting modern technology that saves time and ensures security. The researcher developed a Test Bank Management System that can store test items in any subjects. The system is capable of conducting item analysis using the Rasch model scale. Items that undergo analysis based on Rasch scale helped faculty by quantifying each item as "good", "rejected", or "revised". For securing items in the test bank, Data Encryption Standard (DES) algorithm was successfully applied thus ensuring the safety and reliability of the questions in the test bank. Only items that are ready for deployment to the student's computer during the examinations will be decrypted. In conclusion, the system passed the evaluation process and eliminates redundancy of manual work.

Бесплатно

Журнал