Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

An Identity-based Blind Signature Approach for E-voting System

An Identity-based Blind Signature Approach for E-voting System

Mahender Kumar, C.P. Katti, P. C. Saxena

Статья научная

Electronic voting is a voting process using electronic mean that allows voters to cast their secret and secure vote over an unsecured channel. Many forward-thinking countries are adopting the electronic voting system to upgrade their election process. Since E-voting system is more complex so it requires more security as compared to the postal voting system. One of the fine tool to provide the voter anonymity is the blind signature scheme. Many blind signature proposals based on traditional public key cryptosystem have been discussed, however, they get the worst of certificate and public key management. In this sense, the objective of the paper is twofold. Firstly, we proposed a blind signature scheme using the identity-based cryptosystem. Proposed scheme uses the combination of Bolyreva’s blind signature scheme and Cha-Chaon’s Identity-based signature. Secondly, we show that proposed scheme is more suitable for E-voting system as compared with others ID-based blind signature scheme.

Бесплатно

An Improved Chaotic Bat Algorithm for Solving Integer Programming Problems

An Improved Chaotic Bat Algorithm for Solving Integer Programming Problems

Osama Abdel-Raouf, Mohamed Abdel-Baset, Ibrahim El-henawy

Статья научная

Bat Algorithm is a recently-developed method in the field of computational intelligence. In this paper is presented an improved version of a Bat Meta-heuristic Algorithm, (IBACH), for solving integer programming problems. The proposed algorithm uses chaotic behaviour to generate a candidate solution in behaviors similar to acoustic monophony. Numerical results show that the IBACH is able to obtain the optimal results in comparison to traditional methods (branch and bound), particle swarm optimization algorithm (PSO), standard Bat algorithm and other harmony search algorithms. However, the benefits of this proposed algorithm is in its ability to obtain the optimal solution within less computation, which save time in comparison with the branch and bound algorithm (exact solution method).

Бесплатно

An Improved Method of Geometric Hashing Pattern Recognition

An Improved Method of Geometric Hashing Pattern Recognition

Ling Ma, Yumin Liu, Huiqin Jiang, Zhongyong Wang, Haofei Zhou

Статья научная

Geometric hashing (GH) is a general model-based recognition scheme. GH is widely used in the industrial products assembly and inspection tasks. The aim of this study is to speed up the geometric hashing pattern recognition method for the purpose of real-time object detection applications. In our method, a pattern is decomposed into some sub-patterns to reduce the data number in hash table bins. In addition, the sub-patterns are recorded in a plurality of hash tables. Finally we improve the recognition performance by combining with image pyramid and edge direction information. To confirm the validity of our proposed method, we make a complexity analysis, and apply our method to some images. Both complexity analysis and experiment evaluations have demonstrated the efficiency of this technique.

Бесплатно

An Improved Text Clustering Method based on Hybrid Model

An Improved Text Clustering Method based on Hybrid Model

Jinzhu Hu, Chunxiu Xiong, Jiangbo Shu, Xing Zhou, Jun Zhu

Статья научная

According to the high-dimensional sparse features on the storage of textual document, and defects existing in the clustering methods or the hybrid methods which have already been studied by now and some other problems. So an improved text clustering method based on hybrid model, that is a text clustering approach (short for TGSOM-FS-FKM) based on tree-structured growing self-organizing maps (TGSOM) and Fuzzy K-Means (FKM) is proposed. The method has optimized the clustering result through three times of clustering. It firstly makes preprocess of texts, and filters the majority of noisy words by using an unsupervised feature selection method. Then it used TGSOM to execute the first clustering to get a rough classification of texts, and to get the initial clustering number and each text’s category. And then introduced LSA theory to improve the precision of clustering and reduce the dimension of the feature vector. After that, it used TGSOM to execute the second clustering to get more precise clustering results, and used supervised feature selection method to select feature items. Finally, it used FKM to cluster the result set. In the experiment, it remained the same number of feature items and experimental results indicate that TGSOM-FS-FKM clustering excels to other clustering method such as DSOM-FS-FCM, and the precision is better than DSOM-FCM, DFKCN and FDMFC clustering.

Бесплатно

An Improved, Efficient and Cost Effective Software Inspection Meeting Process

An Improved, Efficient and Cost Effective Software Inspection Meeting Process

Dilawar Ali, Ali Javed, Awais Tanveer, Shahroon Saleem

Статья научная

Normally, the inspection process is seemed to be just finding defects in software during software development process lifecycle. Software inspection is considered as a most cost effective technique, but if these defects are not properly corrected or handled it would cost you more than double later in the project. This paper focus on the last phase of inspection meeting process showing the importance of Follow-Up Stage in software inspection meeting process. This paper also suggests a set of activities that should be performed during the Rework and Follow-Up Stages so to get inspection meeting results productive and efficient. In this paper we focus on the over the shoulder reviews so to ensure the software quality having less impact on the total software cost.

Бесплатно

An Ingenious Wireless Home Security System and Protocol based upon Multi-hop 802.15.4 standard, Magnetic contact and PIR sensor

An Ingenious Wireless Home Security System and Protocol based upon Multi-hop 802.15.4 standard, Magnetic contact and PIR sensor

Ulya Sabeel, Nidhi Chandra, Shivraj Dagadi

Статья научная

Security is the major part of home automation systems for the people. With the development of network and automatic control technology, a home security monitoring and alarming system becomes more and more practicable today. In this paper we have proposed simple, low cost, low power consumption and a novel method for implementing the home security using Zigbee (802.15.4) standard and also a security protocol for detecting and localizing identity based attacks in the system. We have named our scheme as Wireless Home Security System (WHSS) and protocol as Wireless Home Security Protocol (WHSP). It consists of many sensor nodes deployed in the rooms as well as the doors/ windows of the house together with the zigbee modules which act as end devices that monitor continuously and send the security status of each room to the coordinator node connected to a PC which acts as the master. The communication in this case is multi-hop which provides unlimited range. Here we have used the XBEE Pro series1 (XBP24-AWI-001) radios for RF communication, DYP-ME003 PIR sensor, and Contact Door / window sensor based on magnetic reed switch (ORD221).The hardware implementation has been tested for validation successfully. The software has been implemented using C#. Also the performance of our proposed security protocol has been analysed using NS2 and is found to be satisfactory.

Бесплатно

An Insight to Soft Computing based Defect Prediction Techniques in Software

An Insight to Soft Computing based Defect Prediction Techniques in Software

Kritika Verma, Pradeep Kumar Singh

Статья научная

Nowadays, the complexity and size of software systems is proliferating. These factors have various pros and cons. On one side where they lead to better performance and satisfactory results, on the other side they lead to high testing cost , wacky results , poor quality and non-reliability of the product. These problems have one root cause which is referred to as defects in the software systems Predicting these defects can not only rule out the cons but can also boost up the pros. Various techniques are present for the same which are reviewed in depth in this paper. Moreover, a comparison of these techniques is also done to throw a lime light on those which provide the best results.

Бесплатно

An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm

An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm

Somdip Dey, Joyshree Nath, Asoke Nath

Статья научная

In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced Caesar Cipher method, TTJSA method, Bit wise Rotation and Reversal method. The encryption method consists of three basic steps: 1) Encryption Technique using Advanced Caesar Cipher, 2) Encryption Technique using TTJSA Algorithm, and 3) Encryption Technique using Bit wise Rotation and Reversal. TTJSA Algorithm, used in this method, is again a combination of generalized modified Vernam Cipher method, MSA method and NJJSAA method. Nath et al. already developed some symmetric key encryption methods namely MSA, DJSA, DJJSA, modified DJJSA, NJJSA, TTJSA, TTSJA, DJMNA, UES-I, UES-II etc. The cryptanalysis shows that TTJSA is free from standard cryptographic attacks such as differential attack, plain text attack or any brute force attack. In the present method the authors have used advanced modified Caesar Cipher method where the authors have modified the standard Caesar Cipher method and then they applied TTJSA method to make the entire crypto system very hard to break. The present method has been tested on different plain text specially with repeated character and the spectral analysis of the plain text and the encrypted is also been shown. The spectral analysis shows that the present cryptography method, SJA can not be broken with any kind of standard cryptography attack. The authors propose that the present method will be most suitable for password, SMS or any kind of small message encryption.

Бесплатно

An Interactive Teaching – Learning Tool for Underprivileged Children in Rural Schools

An Interactive Teaching – Learning Tool for Underprivileged Children in Rural Schools

H.Vignesh Ramamoorthy, P.J.Balakumaran, H.Karthikeyani

Статья научная

In a country like India, there are children who starve for food, water and cannot spend time for studying and they have to work hard, to get one meal a day. The dropouts in schools are high because of various reasons. Education is not at affordable cost, government must bring some schemes. 80% schools suffer from shortage of teachers, infrastructural gaps and several habitations. There are also frequent allegations of government schools being riddled with absenteeism and mismanagement and appointments are based on political convenience. Despite the allure of free lunch-food in the government schools, many parents send their children to private schools. As a result, proponents of low cost private schools, critiqued government schools as being poor value for money. Furthermore, many international schools with most modern Information Communication Technology (ICT) tools are mushrooming even in remote villages because the rural elites who are able to afford school fees in a country where large number of families live in absolute poverty. The major objective of this paper is to develop an interactive teaching-learning tool with multimedia applications for underprivileged children in rural schools. This tool will help the rural school children to have quality education at an affordable cost.

Бесплатно

An Investigation and Structure Model Study on College Students'Studying-interest

An Investigation and Structure Model Study on College Students'Studying-interest

Chuanmei Wang

Статья научная

Nowadays college students’ studying-weariness is a common problem needs to be solved in China. Also, college students' studying-interest, studying-weariness psychology and misbehaviors have been the subject of considerable research in the last few years to educators and researchers all over the world. However, most of the existing studies in this field are qualitative theory analysis and short of actual investigation, survey and even less mathematical quantificational study. The investigation and study on studying-interest of college students from four universities in Wuhan demonstrates that college students show generally studying-weary mentality and correlative misbehaviors. With the designed college students' learning-interest questionnaire, college students in four universities of Wuhan were surveyed. And based on this survey, Structural Equation Model (SEM) was used to analyze the date of our investigation of the factors affecting college students’ studying-interest and studying-weariness. Results of our quantitative statistical analysis with mathematical model show the degree of each factor influencing studying-interest and studying-weariness. School-related factor and society-related factor are the main influences on college students’ studying-interest and studying-weariness. The major objective of this paper is to provide an integrative review of the college students’ studying-interest and studying-weariness, in order to contribute to the development of high education. Countermeasures and Suggestions are also put forward to rectify the college students’ studying-weariness. This work will play an important role for education departments and educators to take corresponding measures to provide scientific guidance of high education.

Бесплатно

An Investigation into Mobile Application Development Processes: Challenges and Best Practices

An Investigation into Mobile Application Development Processes: Challenges and Best Practices

Harleen K. Flora, Xiaofeng Wang, Swati V.Chande

Статья научная

The mobile device market has witnessed swift industrial growth over the last decade. The quick expansion of this new computing platform has almost outpaced the software engineering processes customized to mobile application development. However, there is still lack of novel research initiatives around the mobile application development process. There remains a deficiency in development standards and best practices which expose the mobile device to potential attacks. This deficiency needs to be addressed promptly and requires further work. The objective of this research is to better understand the current methodologies adapted and to investigate challenges faced during the mobile application development processes that are different from traditional enterprise application. For this purpose, an online survey was conducted from the mobile research and development community. The survey questions covered the entire mobile application development lifecycle starting with requirements, and ending with bringing to life a complete mobile application. The study contributes towards a greater understanding of mobile application development process, examines real challenges confronted, and investigates the best practices that can be successfully implemented to enhance, evaluate, and improve the performance of the mobile application development process. These findings can also be considered as a possible research topic that indicates the breadth of research requirements and prospects in mobile computing.

Бесплатно

An Investigation of Software Engineering Knowledge of Undergraduate Students

An Investigation of Software Engineering Knowledge of Undergraduate Students

Isong Bassey, Dominic Afuro, Mbodila Munienge

Статья научная

Computer programming (CP) course offered in universities is difficult coupled with insufficient infrastructures and teaching staff. In spite of these, several undergraduate Computer Science (CS) students are increasingly acquiring programming skills and developing commercial applications even without attending formal programming classes. However, software intended for use other than by the developer requires teamwork, the use of software engineering methodologies and quality. What is not known about these undergraduate students is how their programming is learnt or applications developed. This is important in the light of software dependability and cost of failures today. Therefore, this paper investigates how undergraduate CS students learn programming and their software engineering knowledge. The purpose is to gain insights into how knowledge is gained and applied. To accomplish this, the paper conducted a survey utilizing questionnaire and interview on undergraduate students of CS in the University of Venda (UNIVEN). The data collected were analyzed and results quantitatively and qualitatively presented. The results showed that many CS students learned programming via the Internet reusable code, applied development methodology and are aware of software quality during development.

Бесплатно

An Ontology Based Remote Patient Monitoring Framework for Nigerian Healthcare System

An Ontology Based Remote Patient Monitoring Framework for Nigerian Healthcare System

Iroju Olaronke, Ojerinde Oluwaseun

Статья научная

There is a rapid increase in the demand of healthcare resources in Nigeria mainly healthcare personnel and healthcare facilities. This is due to the prevalence of chronic diseases such as endemic malaria, arthritis, hypertension, diabetes; an upsurge in the rate of avoidable deaths as well as an exponential increase in the population. However, healthcare resources in Nigeria are insufficient. For instance, in recent times, the ratio of doctors to the inhabitants is 1: 4,857. Moreover, more than 60% of the Nigerian populace resides in rural areas where there are extreme shortages of healthcare practitioners and healthcare facilities due to geographical isolation and lack of opportunities. Hence, the low ratio of healthcare practitioners to patients causes a heavy workload on the healthcare practitioners. This however leads to medical errors as healthcare providers work under intense pressure to attend to the medical needs of their patients. This in turns leads to considerable loss of lives. In order to ameliorate this situation, this paper proposes an ontology based framework that will enable healthcare providers in Nigeria to continuously monitor their patients' health remotely outside the settings of the hospital. This will reduce the workload of the healthcare providers, assist them in decision making process as well as reduce the long waiting hours of the patients within the hospital environment. This framework is also designed to tackle the challenge of semantic interoperability facing healthcare systems around the globe.

Бесплатно

An Ontology-Based Approach for Multi-Agent Systems Engineering

An Ontology-Based Approach for Multi-Agent Systems Engineering

Souleymane Koussoube, Armel Ayimdji, Laure Pauline Fotso

Статья научная

This paper presents OBAMAS (Ontology-Based Approach for Multi-Agent Systems engineering), an ontology-based contribution to Agent Oriented Software Engineering. We propose a formal process for agentification, starting with an analysis phase which consists of the construction of three formal ontologies (a domain ontology, an ontology of functionalities, and an ontology of multi-agents systems) and their alignment to merge in a single one. The second step, which is a design phase, consists of the operationalization of the single ontology in order to infer in a more formal way the agents of the system. A case study is introduced to illustrate OBAMAS and to show its use and effectiveness in a real application, a distance learning system.

Бесплатно

An Optimized Machine Learning Approach for Predicting Parkinson's Disease

An Optimized Machine Learning Approach for Predicting Parkinson's Disease

Mousumy Kundu, Md Asif Nashiry, Atish Kumar Dipongkor, Shauli Sarmin Sumi, Md. Alam Hossain

Статья научная

Parkinson's disease (PD) is an age-related neurodegenerative disorder affecting millions of elderly people world-wide. The early and accurate diagnosis of PD with available treatment might delay neurodegeneration and prevent disabilities. The existing diagnosis method such as brain scan is an expensive process. The use of speech recognition with machine learning technologies for the diagnosis of PD patients could be less expensive. In this work, we have worked with the voice recorded dataset from UCI machine learning repository. Several studies were performed to identify PD patients from the healthy individuals by using voice recorded data with machine learning algorithms. In this paper, we have proposed an optimized approach of data pre-processing that enhances prediction accuracy for diagnosing PD. We obtain 97.4% prediction accuracy with higher sensitivity, specificity, precision, F1 score and kappa value by using AdaBoost. These improved performance evaluation metrics indicate, the use of voice recording with our optimised machine learning approach is highly reliable in prediction of PD. This approach may have significant implications for early stage diagnosis of PD in a cost-effective manner.

Бесплатно

An approach to determination of maximal cliques in undirected graphs

An approach to determination of maximal cliques in undirected graphs

S.V. Listrovoy, A.V. Sidorenko, E.S. Listrovaya

Статья научная

The article proposes the implicit exhaustive search procedure based on the triangle decomposition of graphs for determining the maximal clique in the arbitrary undirected graph G in polynomial time; it has allowed developing an exact algorithm for solving the problem with time complexity not exceeding , where is the number of vertices in the graph G.

Бесплатно

An approach to parallel sorting using ternary search

An approach to parallel sorting using ternary search

Monica Maurya, Alka Singh

Статья научная

This paper describe a parallel sorting algorithm which is the combination of counting sort and ternary search. The proposed algorithm is based on split and concurrent selection strategy. First of all the data sequence is distributed among the different processors and are sorted in parallel using counting sort. Then it applies ternary search to find the index position of all elements globally to find the correct position of each elements in data sequence. This paper analyses the computational complexity of proposed parallel sorting algorithm and compares it with some of existing algorithms. The results of proposed algorithms shows that it is better than existing parallel sorting algorithm like parallel merge sort and binary search based sorting algorithm.

Бесплатно

An approximate 4-2 compressor based on spintronic devices

An approximate 4-2 compressor based on spintronic devices

MohammadAli Shafieabadi, Fazel Sharifi, MohammadMehdi Faghih

Статья научная

In many classes of applications, mainly in signal and image processing applications, decreasing the static power of computational circuits is a challenge. Multipliers are typically located on the critical path of such systems. A promising approach for energy-efficient design of digital systems is approximate or inexact computing. On the other hand, leakage power and limited scalability become serious obstacles that prevent the continuous miniaturization of the conventional CMOS-based logic circuits. Spin-based devices are considered as promising alternatives for CMOS technology due to their proper characteristics such as near-zero current leakage, sustainability, integrity, low standby power. In this paper a new low power approximate 4-2 compressor is presented which is implemented using spintronic devices. The proposed design is utilized in a multiplier tree for image processing applications. We have simulated and compared the proposed design with state-of-the-art designs in both quantitative and qualitative metrics. The simulation results show that the proposed design has 92% and 188% lower power consumption and PDP, respectively compared to the best state-of-the-art design.

Бесплатно

An effective technique to decline energy expenditure in cloud platforms

An effective technique to decline energy expenditure in cloud platforms

Anureet A. Kaur, Bikrampal B. Kaur

Статья научная

The cloud computing is the rapidly growing technology in the IT world. A vital aim of the cloud is to provide the services or resources where they are needed. From the user’s prospective convenient computing resources are limitless thatswhy the client does not worry that how many numbers of servers positioned at one site so it is the liability of the cloud service holder to have large number of resources. In cloud data-centers, huge bulk of power exhausted by different computing devices.Energy conservancy is a major concern in the cloud computing systems. From the last several years, the different number of techniques was implemented to minimize that problem but the expected results are not achieved. Now, in the proposed research work, a technique called Enhanced - ACO that is developed to achieve better offloading decisions among virtual machines when the reliability and proper utilization of resources will also be considered and will use ACO algorithm to balance load and energy consumption in cloud environment. The proposed technique also minimizes energy consumption and cost of computing resources that are used by different processes for execution in cloud. The earliest finish time and fault tolerance is evaluated to achieve the objectives of proposed work. The experimental outcomes show the better achievement of prospective model with comparison of existing one. Meanwhile, energy-awake scheduling approach with Ant colony optimization method is an assuring method to accomplish that objective.

Бесплатно

An efficient adaptive based median technique to de-noise colour and greyscale images

An efficient adaptive based median technique to de-noise colour and greyscale images

Gourav, Tejpal Sharma

Статья научная

The picture noise is an irregular variation of brightness and color information in pictures. It decreases picture quality and permeability of specific elements inside the picture. The most surely understood noise that corrupts the photo with impulse noise. In this work, an effective algorithm is intended to identify and remove noise from a picture. An improved de-noising calculation in view of the median filter is exhibited for greyscale and colored images. The algorithm incorporates two cases: I) if the chose window contains all pixel values "0" to "255" at that point center preparing pixel supplanted by the mean of qualities. II) If the chosen window does not contain all components "0" and "255" then eliminate "0" and "255" and central preparing pixel is replaced by the median of remaining pixels values. The performance is checked off the purposed algorithm by comparing it with corresponding filters. The experiment checked at various noise proportion 5% to 80% for greyscale and color pictures. Results are checked as far as MSE and PSNR and even at high noise proportion; it gives better outcomes over other existing techniques.

Бесплатно

Журнал