Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 590

Evaluation of Machine Learning Techniques for Email Spam Classification

Evaluation of Machine Learning Techniques for Email Spam Classification

Mahmoud Jazzar, Rasheed F. Yousef, Derar Eleyan

Статья научная

Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices. Millions of users worldwide use email to exchange data and information between email servers. On the other hand, unwanted emails or spam became phenomenon challenging major companies and organizations due to the volume of spam which is increasing dramatically every year. Spam is annoying and may contain harmful contents. In addition, spam consume computers, servers, and network resources, causes harmful bottleneck, effect on computing memory and speed of digital devices. Moreover, the time consumed by the users to remove unwanted emails is huge. There are many methods developed to filter spam like keyword matching blacklist/whitelist and header information processing. Though, classical methods like blocking the source to prevent the spam are not effective. This study demonstrates and reviews the performance evaluation of the most popular and effective machine learning techniques and algorithms such as Support Vector Machine, ANN, J48, and Naïve Bayes for email spam classification and filtering. In con conclusion, support vector machine performs better than any individual algorithm in term of accuracy. This research contributes on the for the development of methods and techniques for better detection and prevention of spam.

Бесплатно

Evaluation of Voice & Ear Biometrics Authentication System

Evaluation of Voice & Ear Biometrics Authentication System

Safiia Mohammed, Michael Hegarty

Статья научная

The core aim of biometrics authentication methods and technologies is to solve issues and concerns existing in traditional authentication methods like passwords, PIN numbers or identity cards. The Most important concern for business sectors and organizations is to authenticate individuals who interact with them and their services. By considering more than one biometric technology, the authentication process is expected to be more reliable and secure. The Ear and Voice Multimodal Biometrics System is evaluated to compare its performance with ear and voice unimodal systems; the multimodal system takes advantages of the permanence characteristic of ear biometric and voice biometric which is highly acceptable by users. According to the experiment, the ear and voice multimodal system provides better performance than the ear or voice unimodal system. In addition to that, the multimodal system makes a right balance between false rejection and false acceptance rates. This evaluation is intended to contribute to multimodal biometrics research by using behavioral biometric (voice print) and physiological biometric (ear-print) and makes advantage of using both of them in one system.

Бесплатно

Event Stream Processing in BRT Environment

Event Stream Processing in BRT Environment

Wenfeng Liu

Статья научная

Bus Rapid Transit (BRT) system is a kind of Intelligent Transportation System (ITS), which combines wireless communications, computational technologies, floating car data/floating cellular data technologies, inductive loop detection and so on. The GPS (Global Position System) data and the loop detection data are arriving at the BRT dispatch center massively at the same time so the dispatcher can know the real-time status of buses. The passenger flow data are also captured by devices deployed in the stations and then be passed to center too. How to handle those data at low latency and get some events to be used in bus dispatching is really a problem. In this paper, we propose a framework using ESP (event stream processing) technologies that solves the problem more effectively. At last we demonstrate a prototype system implementation that applies in BRT Line 1 project in Beijing.

Бесплатно

Exact Solutions of Kuramoto-Sivashinsky Equation

Exact Solutions of Kuramoto-Sivashinsky Equation

Dahe Feng

Статья научная

Many nonlinear partial differential equations admit traveling wave solutions that move at a constant speed without changing their shapes. It is very important and difficult to search the exact travelling wave solutions.In this work, the auxiliary Riccati equation method and the computer symbolic system Maple are used to study exact solutions for the nonlinear Kuramoto-Sivashinsky equation. Maple can help us solve tedious algebraic calculation. Therefore many exact traveling wave solutions are successfully obtained which include some new kink (or anti-kink) wave solutions and periodic wave solutions.

Бесплатно

Experimental Comparison of Mutation Testing Tools for C Sharp Language

Experimental Comparison of Mutation Testing Tools for C Sharp Language

Tariful Alam, A. G. M. Zaman

Статья научная

Mutation testing is a popular software testing technique, that inject artificial faults into the program and requires test cases to reveal these faults. In this paper, an experimental comparison is analyzed for different types of mutation testing tools in C Sharp language in .NET framework. Different mutation testing tools are giving different mutation score for a program. The objective of this paper is to investigate why the mutation score is different for different tools, and the scope of generating mutants depending on different types of operators. Four tools, such as, Visual Mutator, Cream, Ninja Turtles, and Nester are selected and applied to a program and analyze the outcome. Among these four mutation testing tools, Visual Mutator is better because of its higher mutation score, and it generates mutants for both common and uncommon standard operators and object level operators.

Бесплатно

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

Exploitation of PDF Reader Vulnerabilities using Metasploit Tool

Ritu Choudhary, Mehak Khurana

Статья научная

With the rising importance of the client-side execution scenario, attackers also shifted their focus to the browser based attacks, and compromises based on client devices. Though security experts have come up with various solutions to such attacks but, the attackers at the same time find new ways and technologies to deal with such situations. In this paper, we will discuss about the framework called Metasploit and then we shall define what exactly the Metasploit Framework is and how it can be used in various attack scenarios, this will be followed by a brief description of the terms used including; the exploits, its modules, payloads and meterpreter. Later, the uses of the product will be discussed. The basic purpose of metasploit framework is a module launching, the attacker is able to configure an exploit module and initiate it at a target system. If the exploit succeeds, the payload is executed on the system for which it is targeted and the attacker can interact with the victim machine using the shell created on the host machine. There are number of exploits and payload options available in metasploit framework. It is one of the most useful frameworks as far as the security is concerned. Lastly, we will discuss the method to attack the compromised systems by malicious PDF file using Metasploit Framework. Therefore, the main purpose of this paper is to impart a deep understanding of what Metasploit is and how it can be utilized when one needs to get the access of the local or the remote machine.

Бесплатно

Exploration and Practice for Evaluation of Teaching Methods

Exploration and Practice for Evaluation of Teaching Methods

Xiaodong Wang, Yingjie Wu

Статья научная

This paper discusses one of a series of achievements of teaching reform for the national excellent course "Algorithms and Data Structures". One of the most valuable and most difficult reforms is to strengthen the practical aspects of the curriculum, while strengthening the teacher-student interactive teaching. Another innovation closely related to this teaching reform is a comprehensive scientific evaluation of teaching methods for this complex teaching process. This evaluation method will evaluate the whole process of teaching by a dynamic multi-factor evaluation. It will effectively promote the teaching level continues to increase.

Бесплатно

Exploration and Practice of Graduation Design for Civil Engineering

Exploration and Practice of Graduation Design for Civil Engineering

MA Zhe, HAO Xiao

Статья научная

Aimed at the present situation of the graduation design in Department of Civil and Materials Engineering, Henan University of Urban Construction, the author analyzed the problems in graduate design, focusing on the theme of improving teaching quality, training high quality professionals, from the design layout to adjust the time, conscientiously prepare for early mobilization, rationally choice the design topic to enhance the process of guiding, strengthening teaching stuff, improve the design evaluation system.

Бесплатно

Exploration and Practice of SE-CDIO Educational Pattern

Exploration and Practice of SE-CDIO Educational Pattern

Liu Jian-Bin, Yang Zhi-Yun

Статья научная

Taking the requirement and the education goal of software engineering application talented person as guidance, referring to advanced ideas of the international CDIO higher engineering education, combining realities of software engineering undergraduate educates, this paper presents that innovative SE-CDIO pattern for the cultivation of software engineers is developed and implemented in curriculum system, practice teaching and other respects in the software engineering undergraduate specialty of Beijing Information Science & Technology University. Through designing SE-CDIO application personnel cultivation program for software engineering undergraduates, carrying out educational reform practice positively, we raise diligently the quality of software engineering undergraduates who conforms to the discipline and social development need, at the same time promote discipline and specialized development.

Бесплатно

Exploration and Practice on Reformation Mode of Undergraduate Tutorial System in Faculty of Computer Science

Exploration and Practice on Reformation Mode of Undergraduate Tutorial System in Faculty of Computer Science

Ma Fu, Yang Ping, Wang Xuetong, Cui Ying'an

Статья научная

In view of the difficulty in employment of computer science major, the further exploration of the new cultivating mode to adapt the social development has been the task at the forefront of the colleges and universities. So, supported by the technological means, the implementation of the undergraduate student tutorial system which follows the principle of “the whole participation, contracting by individual, divide- and-rule”, can make the combination of teaching and moral education in the universities come true, and can make the teaching in accordance with the students’ aptitude to meet the goal of individualized cultivation. It also can be beneficial to the successful operation of credit system thus to cultivate more excellent talents.

Бесплатно

Exploration and Practice on the Integrated Training of Supervisory Control System

Exploration and Practice on the Integrated Training of Supervisory Control System

Xiaolin Feng, Haijie Mao, Zhanming Li, Hui Chen

Статья научная

The integrated training of supervisory control system (abbreviated as ITSCS), whose main task focuses on using related domain knowledge flexible, is discussed carefully with the background of teaching practice. A schematic diagram illustrating the relationship between these parts is put forward and explained. Organizing various knowledge comprehensively, integrating SIMATIC SIM platform with training efficiently, applying practice project in society with students’ learning in university as much as possible, are all traits of the training. The present limitations and authors’ own considerations about improving the training continually are also discussed at the end.

Бесплатно

Exploration of various clustering algorithms for text mining

Exploration of various clustering algorithms for text mining

Neha Garg, R.K. Gupta

Статья научная

Due to the current encroachments in technology and also sharp lessening of storage cost, huge extents of documents are being put away in repositories for future references. At the same time, it is time consuming as well as costly to recover the user intrigued documents, out of these gigantic accumulations. Searching of documents can be made more efficient and effective if documents are clustered on the premise of their contents. This article uncovers a comprehensive discussion on various clustering algorithm used in text mining alongside their merits, demerits and comparisons. Further, author has likewise examined the key challenges of clustering algorithms being used for effective clustering of documents.

Бесплатно

Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot

Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot

Keerti Naregal, Vijay Kalmani

Статья научная

Computing as a utility has been possible with cloud computing technology. Another technology that has evolved with the internet and has become an inseparable part of our lives is the internet of things (IoT). With the growing use of IoT devices, the data generated and used by them is increasing tremendously, and resource-constrained IoT devices can make use of the cloud for data and computing needs. When IoT and cloud converge there are security and privacy issues as the cloud is a shared resource. Access control mechanisms play an important role in maintaining the security of users' data. Attribute-based encryption provides fine-grained access to data, thus ensuring selective access to data. We review the literature on access control mechanisms for cloud-based IoT and provide an analysis of their strengths and weaknesses. We present a comparison of the mechanisms, highlighting the challenges and open research questions in the field of cloud-based IoT access control and provide suggestions for future research and development. Our findings contribute to the understanding of access control mechanisms for cloud-based IoT and provide insights for their selection and deployment in real-world scenarios.

Бесплатно

Exploring Perceptions and Habits of Sri Lankan Users: A Study on Password Management and Adoption of Password Managers

Exploring Perceptions and Habits of Sri Lankan Users: A Study on Password Management and Adoption of Password Managers

Prageeth Fernando

Статья научная

This research paper investigates the attitudes and behaviors of Sri Lankan internet users toward passwords and password managers. The study addresses the security flaws and malpractices associated with passwords and aims to identify effective password management solutions. Two surveys were conducted, one focusing on user attitudes and strategies related to passwords, and the other evaluating user experiences with decentralized offline password managers. The findings reveal that a significant portion of the participants employed complex password-creation strategies and utilized various methods for storing and reusing passwords. Male participants and individuals in the 20-29 age group were predominant in the study. Surprisingly, only a minority of participants had received training in password creation and management. The analysis also indicated that participants without training tended to create easily breakable pass-words, while those with training opted for more complex and stronger passwords. In terms of password management methods, participants without training relied on manual note-taking or memorization, while those with training pre-ferred secure password managers. Furthermore, the study found a higher prevalence of password reuse among partici-pants who used manual password creation methods compared to those who used password generators. The research underscores the need for improved password management practices and increased awareness among Sri Lankan internet users. The findings introduce novel insights into the existing knowledge of password management and lay the groundwork for developing targeted interventions and strategies to enhance security in the Sri Lankan online landscape.

Бесплатно

Exploring the Factors and Dimensions of Information Quality for E-learning Systems: A case of Tanzanian Higher Learning Institution

Exploring the Factors and Dimensions of Information Quality for E-learning Systems: A case of Tanzanian Higher Learning Institution

Renatus Mushi, Deogratius M. Lashayo

Статья научная

The role played by the E-learning system is crucial, especially in the urgent need for working away from the universities and colleges such as on holidays, weekends, and during pandemic situations like COVID-19. Researchers have constantly been producing more sophisticated alternatives for effective usage of E-learning systems and among them include models which explain how users accept, use, and evaluate such systems as they use them on daily basis. Due to the low ICT readiness in developing nations like Tanzania, there is a lack of grounds for the inclusion of various factors and dimensions to the conceptual models which in turn results in testing incomplete, intuitive, and ad hoc sets or irrelevant dimensions. This study closes this gap by conducting a systematic documentary review of studies from 2007 to 2020 on E-learning systems to identify the key factors and their associated dimensions. The findings provide foundations that further research on e-learning acceptance in the contexts of developing countries including Tanzania can adopt on formulating hypotheses and generating information on their research contexts.

Бесплатно

Exploring the Impact of Innovation between japanese KIBS and Clients

Exploring the Impact of Innovation between japanese KIBS and Clients

CAO Yong, LI Yang, NAGAHIRA Akio

Статья научная

The purpose of this paper is to propose an analytical framework to explain why knowledge intensive business services (KIBS) have become an important strategy for many firms. It will especially examine why the relationships between KIBS and clients are different by analyzing the impact of KIBS for different types of innovation and different divisions, and also what and how the service delivery method contributes to each type of innovation for Japanese manufacturing corporations (JMCs). The results show that firstly, KIBS provide professional knowledge to accelerate the different innovation of their clients; secondly, KIBS contribute more to the radical innovation of a client than incremental innovation; and the thirdly, face-to-face delivery is the most efficient method of service from KIBS to the JMCs.

Бесплатно

Exploring the high potential factors that affects students’ academic performance

Exploring the high potential factors that affects students’ academic performance

R. Kaviyarasi, T. Balasubramanian

Статья научная

The rapid increase in student population has resulted in expansion of educational facilities at all level. Nowadays, responsibilities of teachers are many. It is the responsibilities of teachers to guide the students to choose their carrier field according to their abilities and aptitudes. The Data Mining field mines the educational data from large volumes of data to improve the quality of educational processes. Today’s need of educational system is to develop the individual to enhance problem solving and decision making skills in addition to build their social skills. Educational Data Mining is one of the applications of Data Mining to find out the hidden patterns and knowledge in Educational Institutions. There are three important groups of students have been identified: Fast Learners, Average Learners, and Slow Learners. In fact, students are probably struggles in many factors. This work focuses on finding the high potential factors that affects the performance of college students. This finding will improve the students’ academic performance positively.

Бесплатно

Face Recognition using Curvelet Transform and (2D)2PCA

Face Recognition using Curvelet Transform and (2D)2PCA

Ma Hui, Hu Fengsong

Статья научная

This paper proposes a novel algorithm for face recognition, which is based on curvelet transform and (2D)2PCA. Contrast to traditional tools such as wavelet transform, curvelet transform has better directional and edge representation abilities. Inspired by these attractive attributes, we decompose face images to get low frequency coefficients by curvelet transform. (2D)2PCA with an exponential decay factor is applied on these selected coefficients to extract feature vectors, which will achieve dimension reduction as well. The nearest neighbor classifier is adopted for classification. Extensive comparison experiments on different data sets are carried out on ORL and Yale face database. Results prove that the proposed algorithm has high recognition accuracy and short recognition time, and it is also robust to changes in pose, expression and illumination.

Бесплатно

Fast Intra Mode Decision Algorithm Based on Texture Direction Detection for H.264/AVC

Fast Intra Mode Decision Algorithm Based on Texture Direction Detection for H.264/AVC

Jingyan Shang, Wenpeng Ding, Yunhui Shi, Yanfeng Sun

Статья научная

The latest video coding standard H.264/AVC outperforms previous standards in terms of coding efficiency at cost of higher runtime complexity. When RDO is used, the most time-consuming process in a H.264/AVC encoder is mode decision, where all the intra/inter modes are tested to find the optimal coding mode. In this paper, we present a fast intra mode decision scheme, which first detects the texture direction and only tests a subset of intra modes consistent with detected direction. Experimental results demonstrate that the proposed scheme significantly reduces the overall encoding time with negligible coding performance loss.

Бесплатно

Feasibility Analysis and Simulation of the Solar Photovoltaic Rooftop System Using PVsyst Software

Feasibility Analysis and Simulation of the Solar Photovoltaic Rooftop System Using PVsyst Software

Md. Samiul Islam, Faridul Islam, Md. Ahsan Habib

Статья научная

The objective of the research is to design and evaluate the grid-connected solar photovoltaic roof-top system at Tetulia, Panchagrah, Bangladesh using PVsyst software. The main factors of this research are the move toward renewable energy like PV with environmental consequences. The overall performance of a photovoltaic cell is determined by the amount of solar irradiation, the type of PV module used, and the orientation of PV module. Now, the grid-connected PV system is the best choice for large-scale renewable energy. For the case study, PVsyst software is used to analyze a 3kW solar PV plant installed on a rooftop for residential load consumption of 8.1kWh/day. The available AC energy generated by the PV panels is 4172kWh/year, and 1871kWh/year of surplus energy is supplied to the grid after daytime power demand is met. The yearly global horizontal irradiation of Tetulia, Panchagrah is 1485.4kWh/m2 and during the night, the quantity of electricity imported from the grid is 1050kWh/year. This technology helps in the prediction of power outages and backup energy storage because it makes use of the energy stored in the batteries.

Бесплатно

Журнал