Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

A Biometric Based: 3-D Ear Recognition System Combining Local and Holistic Features

A Biometric Based: 3-D Ear Recognition System Combining Local and Holistic Features

Akkas Ali, Mohammad. Mahfuzul Islam

Статья научная

This paper introduces an improved ear recognition approach based on 3 dimensional keypoint matching and combining local and holistic features. At first, the 3D keypoints are detected using the shape index image. The system consists of four primary steps: i) ear image segmentation; ii) local feature extraction and matching; iii) holistic feature extraction and matching; and iv) combination of local and holistic features at the match score level. For the segmentation purpose, we use an efficient skin segmentation algorithm, to localize a rectangular region containing the ear. For the local feature extraction and representation purpose, we use the Sparse Representation based Localized Feature Extraction. For the holistic matching component, we introduce a voxelization scheme for holistic ear representation. The match scores obtained from both the local and holistic matching components are combined to generate the final match scores.

Бесплатно

A Block Permutational Steganographic Algorithm for Scanned Documents and other Images

A Block Permutational Steganographic Algorithm for Scanned Documents and other Images

Saitulaa Naranong, Surapong Auwatanamongkol

Статья научная

Steganography studies the embedding of messages into cover mediums, while obscuring the fact that any message exists. A supplement to encryption, steganographic methods help to avoid attention from adversaries, who may take additional measures if made aware of such messages. Common forms of image steganography, such as Least Significant Bit steganography, alter the first-order statistics of a cover image, allowing for easier detection by methods such as the Wavelet Motion Analyzer. We study steganographic methods based on permutation of pixels in grayscale images, which do not share this disadvantage. A generalization of pixel-swapping methods, our algorithm identifies invariant sets of pixels and intensities, called Permissible Sets, within an image block, and allow their full permutation in the encoding or decoding of messages. This increase in the number of permissible permutations serves to reduce the detectability of our method, while increasing the bit-per-pixel embedding rate. Through direct implementation and comparison, we find our method to be an improvement over previous swap-based steganography for the Microsoft Research Cambridge dataset of general images, and a large improvement for the higher-resolution NoisyOffice dataset of scanned images.

Бесплатно

A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model

A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model

R.Manjula,J.Vaideeswaran

Статья научная

This Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach include continuous improvements in System quality and adhering to global standards. The increasing competency in IT and Educational Sectors necessitates a process maturity evaluation methodology. Accordingly, this paper presents an organizational maturity model for Education system for evaluating the maturity of multi- dimension factors and attributes of an Education System. Assessment questionnaires and a rating methodology comprise the framework of this Educational maturity model. The objective and design of the questionnaires are to collect information about the Education system engineering process from the multi perspectives of academic, infrastructure, administration, facilities etc. Furthermore, we conducted one case study and reported the assessment results using the organizational maturity model presented in this paper.

Бесплатно

A Centralized Controller as an Approach in Designing NoC

A Centralized Controller as an Approach in Designing NoC

Abdolhossein Fathi, Keihaneh Kia

Статья научная

This paper presents a new NoC architecture to improve flexibility and area consumption using a centralized controller. The idea behind this paper is improving SDN concept in NoC. The NoC routers are replaced with small switches and a centralized controller doing the routing algorithm and making control decisions. As one of the main desirable property of NoC is flexibility, in this work with the help of centralized controller, having different topologies and also having two separate networks in a single platform is possible. The other effects of this new scheme are power and area consumption which are investigated. Performance of the NoC is also studied with an analytical model and compared with the traditional NoC. The proposed NoC is implemented in VHDL, simulated and tested with ISE Xilinx.

Бесплатно

A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment

A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment

Andreas Bildstein, Junkang Feng

Статья научная

This article shows a novel approach to semantically align two domain contexts in a distributed system based on the theory of Information Flow [1], also known as Channel Theory. In this article, we propose a 2-step approach to cope with the increasing complexity in constructing the channels, when the channel theory is applied in a complex environment, for example in the area of smart manufacturing. We describe why the methods that had been used so far for constructing the channel might not be suitable for such a complex environment and introduce the main components of our approach. Furthermore, we are explaining how these components work together by using an example from the manufacturing area where product specifications have to be aligned with the production capabilities of manufacturing equipment. Within this example, in the first step a high-level description of production steps is mapped to production processes, and in the second step, a detailed description of the production steps in question is mapped to available equipment and tooling that is related to the filtered production processes from step 1.

Бесплатно

A Chinese Character Text Editor for Embedded System Education

A Chinese Character Text Editor for Embedded System Education

Ye Junjie, Yu Jianxin

Статья научная

A course project experiment plays a very important role in mastering a student embedded system software education. The paper gives the design and implementation solution to a Chinese character text editor for embedded system (CCTE for short), including requirement analysis, function design, task division, main process flow, Chinese character process, man-machine interface layout and test results. This course project can be used as a template for embedded system software experiment.

Бесплатно

A Classification Framework for Context-aware Mobile Learning Systems

A Classification Framework for Context-aware Mobile Learning Systems

Richard A.W. Tortorella, Kinshuk, Nian-Shing Chen, Sabine Graf

Статья научная

The field of context awareness is ever increasing due to the proliferation and omnipresent nature of mobile computing devices. Not only is learning becoming ubiquitous, but the sensors in mobile devices are permitting learning systems to adapt to the context of the learners. This paper provides a classification framework for the field of context-aware mobile learning, which is applied to papers published within selected journals from January 2009 to December 2015 inclusive. Obtained from the combined fields of context awareness and educational technology, a total of 2,968 papers are reviewed, resulting in 41 papers being selected for inclusion in this study. The classification framework consists of three layers: hardware architecture layer, context architecture layer and an evaluation layer. The framework will allow researchers and practitioners to quickly and accurately summarize the status of the current field of context-aware mobile learning. Furthermore, it has the potential to aid in future system development and decision making processes by showing the direction of the field as well as viable existing methods of system design and implementation.

Бесплатно

A Classification Framework for Software Defect Prediction Using Multi-filter Feature Selection Technique and MLP

A Classification Framework for Software Defect Prediction Using Multi-filter Feature Selection Technique and MLP

Ahmed Iqbal, Shabib Aftab

Статья научная

Production of high quality software at lower cost can be possible by detecting defect prone software modules before the testing process. With this approach, less time and resources are required to produce a high quality software as only those modules are thoroughly tested which are predicted as defective. This paper presents a classification framework which uses Multi-Filter feature selection technique and Multi-Layer Perceptron (MLP) to predict defect prone software modules. The proposed framework works in two dimensions: 1) with oversampling technique, 2) without oversampling technique. Oversampling is introduced in the framework to analyze the effect of class imbalance issue on the performance of classification techniques. The framework is implemented by using twelve cleaned NASA MDP datasets and performance is evaluated by using: F-measure, Accuracy, MCC and ROC. According to results the proposed framework with class balancing technique performed well in all of the used datasets.

Бесплатно

A Cloud Based Learning Framework for Eradicating the Learning Challenges of Ethiopian Working Professionals, Disables and Women

A Cloud Based Learning Framework for Eradicating the Learning Challenges of Ethiopian Working Professionals, Disables and Women

Durga Prasad Sharm, Duol Kuey Deng, Getahun Tigistu, Amin Tuni Gure, Bikila Alemu, Getachew Tewachew

Статья научная

Information Technologies have been changing with high speed and existing educational and training frameworks are required to be reviewed, restructured, and redesigned in aligning with the evolving technologies and advanced features. This can strengthen their survival in the highly competitive professional environment. Many of the institutions across the world have been consistently trying to upgrade and transform their educational systems to reduce the cost of learning, enhance the convenience and comfort in normal or adverse situations like pandemics or turbulences. The Ethiopian education system is one of them which has been consistently facing certain critical challenges to afford the education extensions & teaching facilities for citizens. These issues and challenges become critical to those who are working professionals, disabled, and females with pregnancy or the learners who can’t join the classes on regular basis with traditional teaching-learning processes like regular, summer, extension and distance education etc. In recent years a limited number of institutions in Ethiopia tried to encounter accessibility barriers by adopting advanced learning & teaching systems but acceptable level of such systems is still not satisfactory, promising, and popular. However, it has been observed that there is a strong and urgent need to have a better and alternative educational platform with extensive accessibility. Such systems become vital when pandemics or other issues lockdown the traditional education and communication systems. The strategic shift from traditional classroom to e-learning and e-learning to cloud-based learning can be a promising transformation and significant improvement towards next generation teaching-learning environment. To achieve this, a Unified Cloud based E-Learning Framework (UCELF) is proposed and functionally tested using Cloud based Opens Source applications. This study is an attempt to apply an exploratory applied research design using mixed research approach for assessment of the challenges and finally proposing a new cloud-based solution framework for women, disabled, working professionals, and the people challenged by accidental injuries.

Бесплатно

A Collaborative Framework for Web based Vocational Education and Training (VET); Findings from a Case Study

A Collaborative Framework for Web based Vocational Education and Training (VET); Findings from a Case Study

Irum Inayat, Rooh ul Amin, Zubaria Inayat, Khan Badshah

Статья научная

The growing need of trained human capital for economic empowerment and growth has increased the trend of vocational training through e-learning, worldwide. It serves as a major source of training professionals, technicians, skilled workers and students who are unable to carryout formal college education due to time, cost and distance. In this paper we have discussed several cases from literature that made use of e-learning based vocational education and training. Later we have proposed a collaborative framework for vocational education and training using e-learning on the basis of findings from the literature. The framework has been practically implemented in a real world case study and findings revealed that factors like student-student and student-teacher collaboration, individual assessment of students, availability of adequate support material aid in enhancing students' performance and learning outcomes.

Бесплатно

A Common Fixed Point Theorem for R-Weakly Commuting Maps Satisfying Property (E.A.) in Fuzzy Metric Spaces Using Implicit Relation

A Common Fixed Point Theorem for R-Weakly Commuting Maps Satisfying Property (E.A.) in Fuzzy Metric Spaces Using Implicit Relation

Saurabh Manro

Статья научная

The purpose of this paper is to prove a common fixed theorem for R-weakly commuting mappings via an implicit relation in fuzzy metric space. While proving our result, we utilize the idea of property (E.A.) due to Aamri and El. Moutawakil [1] together with common (E.A.) property due to Liu, Wu and Li [2].

Бесплатно

A Comparative Analysis of Cloud Simulators

A Comparative Analysis of Cloud Simulators

Pericherla S Suryateja

Статья научная

Cloud Computing is a new paradigm which allows individuals and organizations to purchase resources like compute, storage, networking etc as a utility with minimum human intervention. According to recent surveys more than half of the large to medium size organizations have already migrated to the cloud. Despite of providing resources as a utility and its wide spread acceptance in the IT community, cloud computing is still at its prime and poses many challenges like automated service provisioning, virtual machine migration, server consolidation, energy management, traffic analysis, data security, software frameworks which needs considerable amount of research to stabilize. Conducting research on live cloud environments for individuals or small institutions is very difficult due to the costs involved in setting up a cloud. This paper presents various cloud simulators which were developed over the years that are a cost effective way of conducting cloud research tasks. This paper compares almost 17 cloud simulators based on diverse criteria and the result and explanations are presented which enables new researchers to choose a suitable cloud simulator.

Бесплатно

A Comparative Study of Software Inspection Techniques for Quality Perspective

A Comparative Study of Software Inspection Techniques for Quality Perspective

Asad Masood Qazi, Sidra Shahzadi, Mamoona Humayun

Статья научная

Software inspection is useful to detect the defects in any stage software development methodology especially in early stages. Inspection of software defects can improve the software product quality by decreasing rework cost and time from documents, code, and other deliverables. The objective of this study is to identify existing software inspection techniques which help practitioners and software engineers to improve the software quality and to compare them according to some quality attributes. Rather than proposing new techniques we focus on synthesize the existing approaches. A comparison of some approaches is conducted and analyzed which approach is more feasible for the detection of defects. The results of this study show that there are many formal and informal techniques available in literature related software inspection, it is difficult to say well to one of them, but our analysis focused on finding such techniques which cover maximum quality factors in an inspection. Software inspection is an umbrella activity of whole software development life cycle and we found different approaches and frameworks in software inspection which can full fill our desired parameters to improve software quality.

Бесплатно

A Comprehensive Study on Excessive Mobile Phone Use and Preventive Measures

A Comprehensive Study on Excessive Mobile Phone Use and Preventive Measures

Arifur Rahaman, Sabrina Tasnim, Md Sohag Hossain Majumdar, Emam Hossen, Md Rafiqul Islam (Rafiq)

Статья научная

The modern world almost wholly depends on advanced technology. Consequently, our life is fully influenced by modern technology-based devices like mobile phones, laptops, tablets, computers and so on. However, we cannot think a single day without the magical device mobile phone. Due to easy usage, people from all classes widely use it for many purposes. Nowadays, it works like all in one. On the one hand, it offers instant calls, messages, net browsing, email checking, watching videos, connecting social media, online gaming, a source of entertainment and many more. We are blessed with this device without any doubt as it puts our modern life forward many steps ahead. On the other hand, people of all age groups are spending most of their time using the mobile phone. Owing to its excessive usage, one may face lots of problems such as depression, chronic pain, distraction, sleepless night and many more which are threatening for people. In this paper, we try to find out how much time people spend on various mobile phone activities such as communication, gaming, social media, and net browsing daily. According to experts we talked and our analysis, excessive mobile phone use can have various detrimental impacts on humans such as short tempered, reduction in patience and appetite, addiction, accidents, sometimes spreading of rumours and high anxiety along with other health issues. Moreover, we suggested some ways to reduce excessive mobile use so that people can avoid negative effects of mobile phone use.

Бесплатно

A Comprehensive Study to Investigate Student Performance in Online Education during COVID-19

A Comprehensive Study to Investigate Student Performance in Online Education during COVID-19

Musaddiq Al Karim, Md. Mahadi Masnad, Mst. Yeasmin Ara, Mostafa Rasel, Dip Nandi

Статья научная

During the recent Covid-19 pandemic, there has been a tremendous increase in online-based learning (e-learning) activities as nearly every educational institution has transferred its programs to digital platforms. This makes it crucial to investigate student performance under this new mode of delivery. This research conducts a comparison among the traditional educational data mining techniques to detect the best performing classifier for analyzing as well as predicting students’ performance in online learning platforms during the pandemic. It is achieved through extracting four datasets from X-University student information system and learning platform, followed by the application of 6 classifiers to the extracted datasets. Random Forest Classifier has demonstrated the highest accuracy in the first two out of the four datasets, while Simple Cart and Naïve Bayes Classifiers presented the same for the remainder two. All the classifiers have demonstrated medium to high TP rates, class precision and recall, ranging from 60% to 100% for almost all of the classes. This study emphasized the attributes that have a direct impact on students’ performance. The outcomes of this study will assist the instructors and educational institutions to identify important factors in the analysis and prediction of student performance for online program delivery.

Бесплатно

A Correlation Framework for different Resource Access Protocol in Real Time System

A Correlation Framework for different Resource Access Protocol in Real Time System

Leena Das, Susmita Saha

Статья научная

We know various scheduling algorithm like EDF, RMA that are popularly used for sharing a set of serially reusable resources. But for share non preemptable resources those algorithm cannot satisfactorily be used. The main intent of resource access protocol is to schedule, and synchronizes the tasks when many tasks use same resources, means where resource is shared. So here in this paper the traditional techniques of resource access protocol which are used to share critical resources among a set of real time tasks, is discussed. This paper is mainly focusing on the different types of resource access protocols and their comparisons.

Бесплатно

A Cost Efficient Solution for Surface Technology with Mobile Connect

A Cost Efficient Solution for Surface Technology with Mobile Connect

Nitin Sharma, Manshul V Belani, Indu Chawla

Статья научная

For the past few decades we have seen the evolution of user interfaces from CLI (Command Line Interface) to GUI (Graphical User Interface) to the most recent NUI (Natural User Interfaces). One such example is Surface Computing. Surface computing is a new way of working with computers that moves beyond the traditional mouse-and-keyboard experience. It is a natural user interface that allows people to interact with digital content with their hands, with gestures and by putting real-world objects on the surface. Though very convenient and simple to use, the cost of this technology is one of the major hindrances in making it accessible to common users. Microsoft PixelSense is an excellent example of this technology. For making this technology cost efficient and more accessible, we have designed an interactive table. It allows two mobile phones to interact with each other, i.e. one can share mobile content just by placing two phones on the table and dragging the content from one phone to another using their fingers. Instead of the usual resistive and capacitive touchscreens used these days, it uses an imaging touch screen, i.e. image processing is used to determine the fingertip coordinates and handle data according to these coordinates thereby decreasing the cost of this technology sharply.

Бесплатно

A Criterion for Hurwitz Polynomials and its Applications

A Criterion for Hurwitz Polynomials and its Applications

Liejun Xie

Статья научная

We present a new criterion to determine the stability of polynomial with real coefficients. Combing with the existing results of the real and negative roots discrimination, we deduced the explicit conditions of stability for any real polynomial with a degree no more than four. Meanwhile, we discussed the problem of controls system stability and inertia of Bezout matrix as the applications of the criterion. A necessary and sufficient condition to determine the stability of the characteristic polynomial of the continuous time control systems was proposed. And also, we discussed a pathological case of the bilinear transformation, which can convert the stability analysis of a given discrete time system to the corresponding continuous time system, and brought forward an alternative one.

Бесплатно

A Design of Learning Management System for Electronic Secretary Based on Ubiquitous Learning

A Design of Learning Management System for Electronic Secretary Based on Ubiquitous Learning

Guangran Liu, Bencai Gao, Jun Lou

Статья научная

The proposed ubiquitous computing creates a new calculation model. Ubiquitous learning based on ubiquitous computing is the trend of current study theory. This paper introduces the concept of ubiquitous learning, analyzes and summarizes its thoughts and main characteristics, constructs the model of a ubiquitous learning environment. With the guidance of constructed ubiquitous learning environment model, we design the management system for electronic course-lattice, and use the metaphor of secretary naming the management system as electronic secretary.

Бесплатно

A Driving Behavior Retrieval Application for Vehicle Surveillance System

A Driving Behavior Retrieval Application for Vehicle Surveillance System

Fu Xianping, Men Yugang, Yuan Guoliang

Статья научная

Vehicle surveillance system provides a large range of informational services for the driver and administrator such as multiview road and driver surveillance videos from multiple cameras mounted on the vehicle, video shots monitoring driving behavior and highlighting the traffic conditions on the roads. How to retrieval driver’s specific behavior, such as ignoring pedestrian, operating infotainment, near collision or running the red light, is difficult in large scale driving data. Annotation and retrieving of these video streams has an important role on visual aids for safety and driving behavior assessment. In a vehicle surveillance system, video as a primary data source requires effective ways of retrieving the desired clip data from a database. And data from naturalistic studies allow for an unparalleled breadth and depth of driver behavior analysis that goes beyond the quantification and description of driver distraction into a deeper understanding of how drivers interact with their vehicles. To do so, a model that classifies vehicle video data on the basis of traffic information and its semantic properties which were described by driver’s eye gaze orientation was developed in this paper. The vehicle data from OBD and sensors is also used to annotate the video. Then the annotated video data based on the model is organized and streamed by retrieval platform and adaptive streaming method. The experimental results show that this model is a good example for evidence-based traffic instruction programs and driving behavior assessment.

Бесплатно

Журнал