Статьи журнала - International Journal of Education and Management Engineering

Все статьи: 590

Based on DSP Builder of 2PSK Digital Modem Design

Based on DSP Builder of 2PSK Digital Modem Design

Hongyang Zhao

Статья научная

Through analysis on principles of Binary Phase Shift Keying(2PSK) modulation and demodulation, the design scheme based on DSP Builder of DDS (Direct Digital frquency Synthesizer) is put forward. By using DSP Builder complete modulation and demodulation model, carrier signal was generated by DDS signal source. The circuit hardware structure of this design is simple and easy to implement. The modularized design is rapid and efficient. Its relevent parameters can be adjusted flexibly. The desired effect can be achieved by simulation.

Бесплатно

Based on Network moral Education for Teenagers Path Choices of Dual Influence

Based on Network moral Education for Teenagers Path Choices of Dual Influence

Liu Ping-Xiu

Статья научная

Network not only can bring the great convenience for the young people to widen the vision or to get the knowledge, but also can lead to the great wave of mind and moral. Here we analyze the dual influence of network for the teenagers’ ideological and moral, and also raise the route choices of moral education for the network, such as: shifting the moral ideas, enhancing the control of Green-Network Home, improving the adolescents’ personality and prompting the teenagers back to real world.

Бесплатно

Based on The Research and Application of Tengen Software in Architectural Design Teaching Process

Based on The Research and Application of Tengen Software in Architectural Design Teaching Process

TANG Hong, FAN Guo-ling

Статья научная

With the continuous development of high technology, architectural design is on the way to paperless digital era. In order to help students grasp and skillfully apply the architectural computer aided design software and cultivate talented architects with the times, this article is going to bring the Tangent software into architectural teaching. On the basis of graphic and elevation design, section design, three-dimensional modeling and so on in architecture, It expounded the early program draft and the control of late deepening program in view of Tangent software, pointing out the interaction between design software and architectural program so as to make students really understand the function of Tangent software and then improve the students' comprehensive skills.

Бесплатно

Behavioral Changes of Children Intelligence for the Extreme Affection of Parents

Behavioral Changes of Children Intelligence for the Extreme Affection of Parents

Prodipto Bishnu Angon, Sujit Mondal, Chandona Rani Das, Mintu Kumar Bishnu

Статья научная

A nation's most valuable resource is its children. In the future, a nation will be controlled in the same way that a kid will develop. The majority of parent’s lack expertise about how to help their children develop a positive outlook. We concluded in our study by analyzing the association between parental excessive affection and the development of children's intelligence. Through the use of a questionnaire, information was gathered from 531 families. Whereas 43 percent of parents show excessive affection to their children, while 45 percent lavish proper affection. On the other hand, in our study, 48 percent of the children had an IQ score of less than 49. We have identified the alterations in their child's brain as a result of their parents' blind affection and have also identified remedies to the problem. We analyzed it so that the growth of children's intelligence is not hampered by their parents' excessive affection and that the parents and children enjoy a close relationship with their parents.

Бесплатно

Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle

Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle

Ratun Rahman, Md. Rafid Islam

Статья научная

In the past few years, the number of IoT devices has grown substantially, and this trend is likely to continue. An increasing amount of effort is being put into developing software for the ever-increasing IoT devices. Every IoT system at its core has software that enables the devices to function efficiently. But security has always been a concern in this age of information and technology. Security for IoT devices is now a top priority due to the growing number of threats. This study introduces best practices for ensuring security in the IoT, with an emphasis on guidelines to be utilized in software development for IoT devices. The objective of the study is to raise awareness of the potential threats and emphasize the use of secure software development lifecycle. The study will also serve as a point of reference for future developments and provide a solid foundation for securing IoT software and dealing with vulnerabilities. This paper divides the most common concerns with Internet of Things (IoT) security into three primary categories, and then further subdivides each of those categories into other subcategories.

Бесплатно

Best approach to teach advanced programming

Best approach to teach advanced programming

Soly Mathew Biju

Статья научная

This paper focuses on an approach that could be effective for teaching programming languages such as advanced Java Programming, and involves a new framework implemented using the practical approach along with new framework. Assessment tools were designed to facilitate this kind of approach toward teaching programming. The new approach is implemented by conducting lectures in the lab or laptop facilitated classroom. The subject assessments and delivery methods were modified to include projects and class works. Students were encouraged to apply concepts learnt in the class in an incremental manner leading to a complete software application and also write a reflective report. It adapted the Kolb’s experimental learning style theory. Effectiveness of this approach is evident through a comparison of students’ results obtained after implementation of this approach, with results obtained using the traditional style of teaching.

Бесплатно

Big Data Challenges in Biometric Technology

Big Data Challenges in Biometric Technology

Shafagat Mahmudova

Статья научная

This study is devoted to Big Data problems in biometric technologies. It highlights the importance of the use of Big Data technologies in solution of a wide range of issues facing the national security, law enforcement system and defense authorities. The study provides information about Big Data and advanced cloud technologies in the field of biometric technology.

Бесплатно

Bilingual Teaching on Advanced Mathematics

Bilingual Teaching on Advanced Mathematics

Wang Rui, Wang Yawei, Liang Baosong, Cao Dianli

Статья научная

With progressive development of innovation and technology, education in higher college should keep up with the step of times development, the bilingual teaching of advanced mathematics is just the best choice for students to grasp mathematics knowledge and simultaneously to improve English skills, and it will be an important link in improving the quality of the entire Chinese nation. Through the bilingual teaching practice, the authors put emphasis on the important role of bilingual teaching in advanced mathematics, and further raised strategies in how to improve university students’ comprehensive ability based on bilingual teaching of advanced mathematics.

Бесплатно

Binary Encoding Differential Evolution for Combinatorial Optimization Problems

Binary Encoding Differential Evolution for Combinatorial Optimization Problems

Changshou Deng, Bingyan Zhao, Yanlin Yang, Hai Zhang

Статья научная

Differential Evolution algorithm is a new competitive heuristic optimization algorithm in the continuous field. The operators in the original Differential Evolution are simple; however, these operators make it impossible to use the Differential Evolution in the binary space directly. Based on the analysis of problems led by the mutation operator of the original Differential Evolution in the binary space, a new mutation operator was proposed to enable this optimization technique can be used in binary space. The new mutation operator, which is called semi-probability mutation operator, is a combination of the original mutation operator and a new probability-based defined operator. Initial experimental results of two different combinatorial optimization problems show its effectiveness and validity.

Бесплатно

Blockchain Based Secure Traffic Police Assistant System

Blockchain Based Secure Traffic Police Assistant System

Dipti Pawade, Avani Sakhapara, Raj Shah, Siby Thampi, Vignesh Vaid

Статья научная

There are large numbers of vehicles in the populated country like India. It’s a very common scenario that traffic police came across some vehicle random vehicle and had some doubt in mind but do not have in hand information about that vehicle and end up leaving that thought. Sometimes this may result in some disaster. With the advent of technology, there are mobile applications and web based systems are available to ease up the process by which traffic police can fine the vehicle owner or people can pay the fine online. But yet there is no system is available through which traffic police can get all the details about the particular vehicle. This motivated us to design and developed an application thorough which traffic police can get all the information right from owner of the vehicle to its RC book and insurance status on just one click. Looking at the chances of data tampering, we have also played an attention to the data security and used blockchain for creating distributed, robust and tempered proof system. In this paper we have discussed traffic police assistance system, which can scan the vehicle number plate, identify the number and provide the all the information and documents stored against that vehicle number. To address the issue of data security and alteration of sensitive data blockchain is used so that any alteration can be monitored. As the complete information process is dependent on how correctly the vehicle number is identified, so the number plate recognition module is tested thoroughly under various conditions. Finally user feedback is taken and analyzed to evaluate the feasibility and usability of the proposed application.

Бесплатно

Bruteporter: a hybrid approach

Bruteporter: a hybrid approach

Balamurugan Mahalingam, Kannan S., Vairaprakash Gurusamy

Статья научная

Stemming fetches the main root word from the inflectional words called stem. Stem gives different meaning when suffix or prefix is added to it. The stem need not give perfect meaning. Lemmatization gives lemma from inflectional words. Lemma should give meaning that in the dictionary form. Natural Language processing, Information retrieval, Text mining are the areas which use the stemming as preprocessing step. Through stemming, the size of the document can be reduced and ambiguity is also removed. It makes the work easy for other process likes information retrieval, semantic analysis, text categorization etc. Though there is a need for linguistic improvements in the existing stemming algorithms, all these algorithms fail in some cases to give an exact Root word and are not able to handle informal verbs. Hence, Bruteporter Hybrid approach is proposed in order to improve the linguistic process of stemming in English Texts. It combines the Wordnet and Modified Porter Algorithm. A Wordnet is a lexical dictionary created by linguistics people. Modified porter algorithm has both suffix removal and suffix substitution functionality. This proposed approach can extract root word from both inflectional words and informal verbs. In this paper, Experiment is conducted on proposed algorithm and the accuracy is calculated.

Бесплатно

COMBINE DIFFERENT KNOWLEDGE, TRAIN STUDENTS MECHATRONIC THINKING

COMBINE DIFFERENT KNOWLEDGE, TRAIN STUDENTS MECHATRONIC THINKING

Zhang Ziyi, Mao Zhiyong, Yang Zhiqin, Duan Kailu

Статья научная

A pedagogy of training students think in the way of mechatronics is introduced in this article. The importance of teachers’ working style in training students to think in the way of mechatronics is stated. The reason of combination of different technologies in teaching can be educed. The article also stated the importance of combination of different knowledge which can make students learn more skills easily.

Бесплатно

CarryIT: Design and Implementation of an Effective Parcel Carrying System

CarryIT: Design and Implementation of an Effective Parcel Carrying System

Khandaker Mohammad Mohi Uddin, Md Razwanul Ghani, Kazi Hozayfa Ahsan, Rafid Mostafiz, Samrat Kumar Dey

Статья научная

A plethora of courier services are available in Bangladesh which are more expensive, less effective and takes ages to deliver the product. Besides, in the ongoing COVID-19 pandemic situation, it’s onerous to move from one place to another, and if a person wants to send a product, he/she needs to go to the courier office. Moreover, many people need to move from their house for attending office, meetings, and traveling from one district to another district for special purposes. In this paperwork, a system is introduced to reduce the cost and time to send a product from one place to another place. Basically, an application is developed to meet the people who want to send a product and another one who want to carry the product. For carrying the product one can easily earn money. After scrutinizing the cost of courier services in Bangladesh, an algorithm is introduced to calculate the carrying cost of the product and an algorithm is also developed for product security.

Бесплатно

Change Impact Identification in Object-Oriented System: Dependence Graph Approach

Change Impact Identification in Object-Oriented System: Dependence Graph Approach

Abdi Mustapha Kamel, Dinedane Mohammed Zoheir

Статья научная

The development of software products consumes a lot of time and resources. On the other hand, these development costs are lower than maintenance costs, which represent a major concern, specially, for systems designed with recent technologies. Systems modification should be taken rigorously, and change effects must be considered. The need to offer tools allowing on the one hand, to explain the mechanisms of changes at the source code level, and on the other hand, to reduce the effort as well as the cost of maintenance, is affirmed more and more. We propose in this article an approach based on dependence graph to identify change impact of object-oriented systems. The analysis of change ripple effect is made on the dependence graph representing the considered system. The identification at graph level of maximum range of change ripple effect will enable us to know consequences change at code source of system. This knowledge will enable us to estimate the change cost and to make a compromise between the various suggested changes. Finally, to concretize this study we produced a tool and tested our approach on certain systems.

Бесплатно

Circuit Design of RF Remote Controller in Code Matching Mode

Circuit Design of RF Remote Controller in Code Matching Mode

Weidong Zhang, Gengsheng Zheng, Qifu Liu

Статья научная

The concept and the state of the art of RF are reviewed firstly, as well as the superiority over the infrared. Then the design of the software and circuits of RF remote controller in code matching mode (RFRCCMM) is introduced, as well as the chip selection and the interface of SPI. The design approach of RFRCCMM is presented with the interpretation about the distribution of components and the layout.

Бесплатно

Classification of Coronary Artery Disease Using Different Machine Learning Algorithms

Classification of Coronary Artery Disease Using Different Machine Learning Algorithms

Bahar Nazlı, Yasemin Gültepe, Hayriye Altural

Статья научная

Coronary Artery Disease (CAD) takes place in the category of fatal diseases resulting in death in our country and around the world. Each year about 340 thousand patients lost their lives due to CAD in Turkey. Early diagnosis is essential to reduce risk and prolong lifetime of these patients for diseases that require long-term treatment having death risk like CAD. For this reason, classification of CAD by using medical data processing and machine learning algorithms are important in order to develop assistive or expert systems for physicians. In this study, five different machine learning algorithms were applied to estimate whether patients in the Z-Alizadeh Sani data set extracted from the UCI machine learning pool are CAD. Accuracy, precision, recall, specificity and F1 score were compared as classification performance indicators to evaluate decision tree, random forest (RF), support vector machines (SVM), nearest neighborhood (k-NN) and multi-layer sensor (MLP) methods. According to the evaluation results, the MLP method gave high classification accuracy with 90%. It also appears that RF performs relatively better than other metrics. This results, show that these classification algorithms can be use for helping healthcare systems.

Бесплатно

Classroom Management Strategies and Academic Performance of Junior High School Students

Classroom Management Strategies and Academic Performance of Junior High School Students

Maxwell Kontor Owusu, Bakari Yusuf Dramanu, Mark Owusu Amponsah

Статья научная

The study examined the influence of classroom management strategies of Junior High School teachers on the academic performance of students in the Ashanti Akim North District. The descriptive survey design was used for the study. One hypothesis and two research questions were developed to guide the study. Multistage sampling technique was used to select 48 teachers and 297 year two students to respond to the Behaviour and Instructional Management Scale (BIMS). Test scores in English Language, Integrated Science, Mathematics and Social Studies were used to measure students’ academic performance. The statistical tools used to analyse the data collected were means, standard deviation, Pearson’s Product Moment Correlation Coefficient (PPMCC) and Multiple Regression. The findings revealed that both students and teachers identified good relationship and reinforcement as the mostly used classroom management strategies. It was found that a significant positive relationship existed between reinforcement and antecedent as classroom management schemes and students’ academic performance. However, good relationship and punishment as classroom management strategies did not have a positive relationship with the academic performance of students. It is recommended that teachers should use reinforcement and antecedent strategies frequently in their classrooms since they play a dual role of managing behaviour and predicting the academic performance of students. Good relationship as a classroom management strategy should be cautiously used because it could potentially be misinterpreted or abused and can lead to low academic performance. Using punishment as a classroom management strategy should be avoided as its use hinders academic performance of students.

Бесплатно

Classroom Teaching Expansion of Computer Fundamentals Course

Classroom Teaching Expansion of Computer Fundamentals Course

SHANG Junping, LIU Hebing

Статья научная

This paper mainly studies classroom teaching expansion of Computer Fundamentals Course. The classroom teaching of Computer Fundamentals Course can be expanded in the perspectives of time and space by using various resources such as library, Internet, science and technology market for non-computer major students. As shown in the practice results the students have really benefited a lot from these efforts.

Бесплатно

Cloud Computing a Solution for Globalization

Cloud Computing a Solution for Globalization

Tanvir Ahmed

Статья научная

Security issues and exploded human population in the world have dictated many new trends to defend haves from have-nots and vice versa, like globalization through social media while maintaining the geographical boundaries and concept introduced under WTO (World Trade Organization)- Free trading in the world. We know that Globalization is the most significant part of this century which is based only and only upon developments in Information Technology in form of Networking and Software solutions. As business grows, multiregional offices are needed and they required networked computing and information services. For example In Pakistan, lots of offices of multinational companies are working and they are developing and enhancing their business by full filling the demand and needs of customers of the particular city or country. The demand is increasing manifold with every day passing. So huge computing and storage power is needed everywhere and to everyone at every moment which is beyond the capacity of traditional systems already in vogue. New solutions like Cloud computing seems the solution to address such multi-scaled demands. Education system nowadays is the growing business in Pakistan, in this we paper we studied in detail the Education System of Pakistan, what are the flaws of current system and how a new cloud based E-Learning solution helps to improve this system.

Бесплатно

Cloud computing: issues and risks of embracing the cloud in a business environment

Cloud computing: issues and risks of embracing the cloud in a business environment

Shafat Khan

Статья научная

Over the latest couple of years, cloud computing has created from being a promising business thought to one of the rapidly creating portions of the IT business. Despite the boom of cloud and the numerous favorable circumstances, for example, financial advantage, rapid elastic resource pool, and on-demand benefit, endeavor clients are yet hesitant to send their business in the cloud and the paradigm likewise makes difficulties for the two clients and suppliers. An absence of fitting answers for such difficulties may cause dangers, which may exceed the normal advantages of utilizing the paradigm. To address the difficulties and related dangers, an orderly hazard the board practice is vital that guides clients dissect the two advantages and dangers identified with cloud-based frameworks. The point of this paper is to provide better comprehension to configuration difficulties of cloud computing and distinguish essential research heading in such manner as this is an expanding area.

Бесплатно

Журнал