Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 590

A Framework of Network Virtual Experiments for Control Courses

A Framework of Network Virtual Experiments for Control Courses

Lu Jianfeng, Li Hongjun, Ma Yumin

Статья научная

With the development of computer science and Internet, using the virtual experiments to help improvement of teaching effects is becoming more and more popular. This paper describes a framework of virtual experiments for control courses in college. It includes three layers. The user interface layer bases on Flash technology, the data exchange layer bases on Webservice technology, the calculation module in data process layer bases on Modelica language. This framework provides a friendly user interface and solved the problem that the control experiments need multifarious calculation when simulation the real phenomenon. An example of virtual experiment is also be shown in the final of this paper. This framework can also be used for virtual experiments of other courses in college education.

Бесплатно

A Fuzzy Delphi and Fuzzy AHP Application for Evaluating Online Game Selection

A Fuzzy Delphi and Fuzzy AHP Application for Evaluating Online Game Selection

Jao-Hong Cheng, Shu-Wei Chen

Статья научная

The trend of playing online games as an online entertainment has rapidly proliferated worldwide. This paper examines critical factors related to the selection of online games. Taking content design and operations management into account, we identified 15 constructs in the literature survey. The fuzzy Delphi Method is used to evaluate the primary criteria collected from 20 heavy players in Taiwan and the Fuzzy Analytic Hierarchy Process employed to calculate the weights of these criteria so as to establish a fuzzy multi-criteria model of online game selection. The results indicate the greatest weight being placed on the dimension of online game selection, and the 11 critical criteria related to online game selection were: (1) scenario, (2) graphics, (3) sound/light effects, (4) interface, (5) access, (6) interactivity, (7) security, (8) reliability, (9) responsiveness, (10) assurance, and (11) empathy. This study may have a contribution to make in terms of understanding how online game companies can reinforce content design and operation quality in an attempt to achieve competitiveness.

Бесплатно

A Hybrid Approach to Sentiment Analysis of Technical Article Reviews

A Hybrid Approach to Sentiment Analysis of Technical Article Reviews

Babaljeet Kaur, Naveen Kumari

Статья научная

Sentiment analysis is similar to opinion mining, which is a popular research problem to search out in the field of NLP. Sentiment analysis determines the perspective of the author and identifies the positive, negative and neutral reviews. It provides the reviews or opinions of people's on text, article and product which can be positive, negative or neutral. Reviews on the different websites, social networking sites is an important source to collect the information regarding various brands of product and new features in technology (e.g. Windows, Mobiles). During the sentiment analysis various classification tools within the NLP are used to find out the positivity and negativity of reviews or comments. The paper presents a length aware hybrid approach to analyses the reviews either as positive or negative and present approach is tested on SuperFetch data set. The present approach is a combination of both supervised machine learning techniques that are Support Vector Machine and K-Nearest Neighbor in which SVM is working great for large size review and KNN is working best for small size review.

Бесплатно

A Hybrid Weight based Feature Selection Algorithm for Predicting Students’ Academic Advancement by Employing Data Science Approaches

A Hybrid Weight based Feature Selection Algorithm for Predicting Students’ Academic Advancement by Employing Data Science Approaches

Ujwal U.J., Saleem Malik

Статья научная

PerformanceX is a proposed system that combines Educational Data Mining (EDM) techniques to enhance student performance and reduce dropout rates. It employs a hybrid feature selection approach to identify the most significant attributes from student academic datasets, eliminating unnecessary features that are not crucial for predicting performance. The selectX algorithm, a critical component of PerformanceX, selects a limited number of high-performing features to optimize student learning effectiveness and prediction accuracy. The system applies various machine learning classifiers, including a fusion Voting Classifier, to different subsets of features, ultimately determining the best combination. The study achieved an impressive accuracy rate of 99.41%, with the selectX approach utilizing 10 features in conjunction with a random forest (RF) classifier offering the highest accuracy. These findings underscore the importance of categorizing student performance based on a concise yet meaningful set of features, leading to improved student quality and career progression. The research value of PerformanceX lies in the development of a performance forecasting system that eliminates irrelevant information and provides precise predictions for student performance. Its efficacy and efficiency make it an invaluable tool for educators and educational institutions. By assisting students in selecting appropriate courses to enhance their performance and advance their careers, PerformanceX contributes to diminishing dropout rates while fostering positive student outcomes.

Бесплатно

A Lexical Approach for Opinion Mining in Twitter

A Lexical Approach for Opinion Mining in Twitter

Deebha Mumtaz, Bindiya Ahuja

Статья научная

The blossoming of a significant number of social networking sites, blogs, and microblogs has given a podium for general masses to voice their opinion regarding social topics, economic issues, political matters, market trends etc. However, this sudden eruption of review data had opened floodgates to unmanageable records as it is almost impossible for any individual or organization to manually extract any useful information from it. Opinion mining or sentimental analysis is a natural language processing which can obtain the opinion or feeling of people about any particular product or subject. The main focus of this paper is to find a method to perform sentiment analysis of Twitter which is one of the most prevalent microblogging sites. The lexical method proposed in this paper classifies the tweets as positive, negative or neutral depending on the polarity of the words in it. Also, the role of negation words has been investigated.

Бесплатно

A Low Power Consumption Architecture Model for Multiple Processors on Optical Printed Circuit Board

A Low Power Consumption Architecture Model for Multiple Processors on Optical Printed Circuit Board

Xinjiang Shao, Jian Liu, Jiyu Jin, Zhisen Wang, Nianyu Zou

Статья научная

Traditional single-core processors and multiprocessors architectures encounter some problems which are high heat generation, high cost to produce and high power consumption. In this paper, a model to achieve low power consumption by using several processors managed separately with useful energy saving strategies including switching the mode of processors, assign tasks to different CPUs, using optical fiber as transmitting media etc. is proposed. In this way, the architecture manages to disperse the energy dissipation. Some evaluations on power consumption, cost and performance are made which proves that it is an effective method to reduce the power consumption.

Бесплатно

A MDA-based campus data analysis and visualization framework

A MDA-based campus data analysis and visualization framework

Jiangning Xie, Xueqing Li, Lei Wang, Yuzhen Niu

Статья научная

As the rapid development of high education informatization, it will be a new important research topic to con-duct the data mining and visual analytics to the existing data in the separated information systems. The existing campus information system is the integration of some business systems, so the system has some problems, such as it stores the data separately and it has poor ability to analyze data. In order to solve these problems, we pro-pose Model Driven Architecture (MDA) based campus data analysis and visualization framework. The frame-work is composed of multi-dimension data modeling, data extraction, visualization-based data exhibition, and some other modules. Data extraction solves the problem caused by separately stored data and heterogeneous data. Multi-dimension data modeling analysis and visualization enhances the analysis ability of existing system. Based on the idea of MDA modeling analysis, we provide a rapid develop platform of campus business for both business analyzers and developers.

Бесплатно

A Method to Detect Breast Cancer Based on Morphological Operation

A Method to Detect Breast Cancer Based on Morphological Operation

Prashengit Dhar

Статья научная

Breast cancer is one of the most common cancer in women worldwide. Early detection of breast cancer can lead to better treatment and decrease in mortality. Mammogram image in medical technology, made it easier to analyze breast cancer. Mammography exam is a specialized imaging technique in medical to scan breast which results in mammogram image. Detecting breast cancer earlier, a patient can have several treatment options and also can save live. Early detection of breast cancer can leads to survive 93 percent or greater in the initial five years. This paper proposes a brseast cancer detection method from mammogram image sample by applying morphological operation on gray image rather than binary. Firstly, image is sent for gamma correction. Then it is converted to gray and applied morphological dilation. Again morphological opening operation is formed on the dilated image. Output of dilated and opening operation is then binarized. An AND operation is performed between both binary images. Some post processing like- small area filtering and hole filling task is took place. Then common unwanted object is removed. Finally rest of the region is the desired cancer infected region. Achieved performance is acceptable and satisfactory through the proposed method.

Бесплатно

A Model Driven Framework for Portable Cloud Services: Proof of Concept Implementation

A Model Driven Framework for Portable Cloud Services: Proof of Concept Implementation

Aparna Vijaya, Neelanarayanan V

Статья научная

Rapid development of Cloud Computing and its increasing popularity in recent years has driven many commercial cloud providers in the market. Cloud service providers have a lot of heterogeneity in the resources they use. They have their own servers, different cloud infrastructures and APIs and methods to access the cloud resources. Lack of standards has caused the collaboration and portability of cloud services a very complex task. In this paper we have identified the challenges involved in portability of cloud apps and analyzed the existing techniques for portability at platform level. In this paper, we propose an approach using Model Driven Engineering to develop SaaS applications in a cloud-agnostic way. We introduce DSkyL, an eclipse plugin for cloud application development using feature models and domain model analysis, which would support construction, customization, development and deployment of cloud application components across multiple clouds. It also reduces the application development time drastically. This paper aims to sketch the architecture of DSkyL and the major steps involved in the process.

Бесплатно

A New Color Image Quantization Algorithm Based on Fuzzy Kernel Clustering

A New Color Image Quantization Algorithm Based on Fuzzy Kernel Clustering

MA Yu-jie

Статья научная

A new color image quantization algorithm based on fuzzy kernel clustering is studied in this paper. Firstly, the original image is quantized to 256 colors using the octree algorithm. Secondly, based on the quantitative relation of the NBS distance and the color difference of human vision, the initial clustering centers and number are determined automatically. Thirdly, the clustering center color values are modified by use of the fuzzy kernel clustering algorithm in the Munsell space. And then, a color image quantization effect is achieved. At last, simulations are performed on the presented algorithm, and the simulation result shows that the presented algorithm not only can solve the problem of giving the number of quantization in advance but also has better quantization effect than the octree algorithm and fuzzy c-means algorithm in the same quantization number.

Бесплатно

A New Color on Discrimination Based on Characteristics of the Vehicle License Plate Location

A New Color on Discrimination Based on Characteristics of the Vehicle License Plate Location

Xiaole Liu, Cailing Wang

Статья научная

The license plate recognition system, the license plate location is one of the important technologies, can accurately complete the orientation will directly affect the follow-up of the character segmentation and recognition. This paper presents a new color on discrimination based on characteristics of the vehicle license plate location, Firstly, edge detection, image enhancement preprocessing, effectively highlighting the license plate features, And then by line scanning of the plate rough location, and color-based features to distinguish the license plate location method further extract the real license plate. Experiments show that with the car in a complex background, this method can accurately locate the license plate.

Бесплатно

A New Education Mode of Engineering Specialty Graduate Students—Co-founding by college and enterprises, uniting of production, learning and researching

A New Education Mode of Engineering Specialty Graduate Students—Co-founding by college and enterprises, uniting of production, learning and researching

Xu Yabin

Статья научная

The current state and problems of the graduate students’ education in China are set forth in the first. Then, the causes of problems are deeply analyzed. Some ideas and methods in engineering specialty graduate student’s education are offered with co-founding by colleges and enterprises, uniting of production, learning and researching. Some problems that should be noted are pointed out, finally.

Бесплатно

A New Vulnerability Reporting Framework for Software Vulnerability Databases

A New Vulnerability Reporting Framework for Software Vulnerability Databases

Hakan Kekül, Burhan Ergen, Halil Arslan

Статья научная

Cyber security is one of the fundamental research areas of software engineering. The systems that make up today's information systems infrastructure have been developed largely with software support. Security vulnerabilities in the software used in these systems may cause undesirable results. It is very important to manage software vulnerabilities correctly. In addition, an effective communication mechanism and certain standards should be established among those working in this field. The importance of the subject has been understood in recent years and the studies in this area have gradually increased. The use of machine learning algorithms is increasing in recent studies in this area. Although there is a large data set accumulated in vulnerability databases, there is often the problem of unstructured data. Vulnerability databases and security reports are created in natural language that people can understand and interpret. These reports are difficult to read and understand by machines. Our study focuses on the difficulties of this unstructured and natural language system. In order to investigate this problem, firstly, up-to-date and accessible databases used in scientific research were examined and evaluated. Then, a three-stage security framework was proposed, consisting of the use of vulnerabilities by machines to assist experts from the notification stage to the reporting stage. The rules and flow charts of each stage are defined. In order to increase the usability of different databases in their own systems, the framework rules are defined as a guideline containing flexible directions, not rigid items. The point of consideration is not the methods and tools used, but the definition of outputs as common and similar attributes.

Бесплатно

A Novel Thought and Method of University Evaluation

A Novel Thought and Method of University Evaluation

Wang Qi-Ming, ZHAO Xi-nan, Zhang Li-li

Статья научная

How to evaluate universities effectively has been attached great importance to education departments and high schools. University evaluation should advocate university spirit, guarantee and develop university key function; contain the thought of both “sparking plug on developmental contents democracy and centralization” and “develop mode of self-innovation”, it is beneficial for universities to develop according to objective and subjective situations; it can be used to abstract and analyze university developmental mode, it is helpful for classified management.

Бесплатно

A Novel Vehicle Classification Model for Urban Traffic Surveillance Using the Deep Neural Network Model

A Novel Vehicle Classification Model for Urban Traffic Surveillance Using the Deep Neural Network Model

Kamini Goyal, Dapinder Kaur

Статья научная

The vehicle detection is the backbone of the urban surveillance systems, which is used to obtain and identify the various statistics of the urban vehicular mobility. Also the urban surveillance systems are used for the vehicle tracking or vehicular object classification. The proposed model has been designed for the purpose of the urban surveillance and vehicular modelling of the traffic. The proposed model has been designed for the vehicle position identification as well as the vehicle type classification using the deep neural network. The proposed model has been tested with a standard dataset image for the result evaluation. The experimental results has been shown the effectiveness of the proposed model, where the proposed model has been found successful in detection and classification of all of the vehicles in the given image.

Бесплатно

A Practical Scheme for Implementing Client Side Encryptions and Decryptions

A Practical Scheme for Implementing Client Side Encryptions and Decryptions

Lija Mohana, Sudheep Elayidom M.

Статья научная

The amount of data that is generated each day is rapidly increasing so that the traditional ways of data storage seems to be inadequate. Cloud Computing has helped a lot to solve the storage issues but fear of data leakage hinders its widespread acceptance. Even though the public clouds like Amazon, Google etc store the data in encrypted form, data loss can still occur during transmission. The only practical solution is to upload encrypted data to cloud. Hence users should have an additional software or application to encrypt the data before uploading and decrypt the data after retrieval. This article analyzes different solutions for implementing such applications. The article also describes about the cryptographic primitives that can be added for enforcing security.

Бесплатно

A Relational Data-based Lightweight Workflow Engine Model

A Relational Data-based Lightweight Workflow Engine Model

Li Tian, Yonghua Zhu, Huaiyang Zhu

Статья научная

With the swift development of workflow technology, workflow management system has been widely used. To date, many models and architectures are efficient in constructing workflow engine which is the core of a workflow management system. This paper presents a relational data-based lightweight workflow engine model which based on the relational database. In this model, the definition of the workflow and the data used in the workflow process are kept in the database. This model contains the necessary functions and characteristics of simple business flow rather than all the business flow. The model is composed of three main function modules. These three modules interact with database through DBMS. Under the guidance of this model, a flexible and low-cost workflow engine can be built efficiently. Now this model has been used by Shanghai Rongheng Inforamtion Technology Ltd.

Бесплатно

A Research on Operating Performance of Small and Medium-Sized S&T Enterprises—— Based On A Survey towards Zhejiang Province,China

A Research on Operating Performance of Small and Medium-Sized S&T Enterprises—— Based On A Survey towards Zhejiang Province,China

ZHU Meng Jin, CAI Lei

Статья научная

This paper researches into the influential factor affecting operating performance of small and medium-sized S&T Enterprises. It is found that the years of operating and the scale of net assets both have a positive effect on the performance, while registered capital has a negative effect. Though the category of industry doesn't exhibit a clear influence on the performance, different ways of financing do affect the performance considerably.

Бесплатно

A Research on Opinion Analysis for Book Reviews

A Research on Opinion Analysis for Book Reviews

Na Zhai, Fang Yuan, Yu Wang

Статья научная

Product reviews are not only useful for trade companies to improve the quality of products, but also helpful for customers to purchase products reasonably, thus product reviews mining is valuable in application and research. In this paper, we devote the research on book reviews. We first propose a polarity dictionary construction method based on the improved CHI, and realizes dynamic addition of the dictionary; Second, the polarity calculation formula of the transitional complex sentences is improved to be applicable to book reviews. Considering that some book reviews have titles and these titles generally express the reviewers’ opinion tendency, so we further propose an opinion polarity analysis method based on the titles and the improved polarity calculation formula of the heavy transitional sentences. The experimental results show that the approach proposed in this paper is effective.

Бесплатно

A Review of Cloud Computing Security Issues

A Review of Cloud Computing Security Issues

Manpreet kaur, Hardeep Singh

Статья научная

Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments. There are number of users used cloud to store their personal data, so that data storage security is required on the storage media. The major concern of cloud environment is security during upload the data on cloud server. Data storage at cloud server attracted incredible amount of consideration or spotlight from different communities. For outsourcing the data there is a need of third party. The importance of third party is to prevent and control unauthorized access to data store to the cloud. This research paper discuss the security issues of cloud storage.

Бесплатно

Журнал