Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

MLP based Reusability Assessment Automation Model for Java based Software Systems

MLP based Reusability Assessment Automation Model for Java based Software Systems

Surbhi Maggo, Chetna Gupta

Статья научная

Reuse refers to a common principle of using existing resources repeatedly, that is pervasively applicable everywhere. In software engineering reuse refers to the development of software systems using already available artifacts or assets partially or completely, with or without modifications. Software reuse not only promises significant improvements in productivity and quality but also provides for the development of more reliable, cost effective, dependable and less buggy (considering that prior use and testing have removed errors) software with reduced time and effort. In this paper we present an efficient and reliable automation model for reusability evaluation of procedure based object oriented software for predicting the reusability levels of the components as low, medium or high. The presented model follows a reusability metric framework that targets the requisite reusability attributes including maintainability (using the Maintainability Index) for functional analysis of the components. Further Multilayer perceptron (using back propagation) based neural network is applied for the establishment of significant relationships among these attributes for reusability prediction. The proposed approach provides support for reusability evaluation at functional level rather than at structural level. The automation support for this approach is provided in the form of a tool named JRA2M2 (Java based Reusability Assessment Automation Model using Multilayer Perceptron (MLP)), implemented in Java. The performance of JRA2M2 is recorded using parameters like accuracy, classification error, precision and recall. The results generated using JRA2M2 indicate that the proposed automation tool can be effectively used as a reliable and efficient solution for automated evaluation of reusability.

Бесплатно

MLRTS: multi-level real-time scheduling algorithm for load balancing in fog computing environment

MLRTS: multi-level real-time scheduling algorithm for load balancing in fog computing environment

Mohamed A. Elsharkawey, Hosam E. Refaat

Статья научная

Cloud computing is an innovative technology which is based on the internet to preserve large applications. It is warehoused as a shared data over one platform. In addition, it offers better services to clients who belong to different organizations. In spite of the maximum utilization of computational resources provided by the cloud computing with lower cost, it suffers from specific restrictions. These restrictions are encountered through the load balancing of data in the cloud data centers. These restrictions are represented in the less bandwidth utilization, resource limitations, fault tolerance and security etc. In order to overcome these limitations, new computing model called Fog Computing is presented. It aims to offer the required service of the sensitive data to end users without delaying. The function of the fog computing is similar to the cloud computing with two preferred advantages. The first one is that it is placed more near to the end users to introduce its service in less time. Secondly, it is more valuable for streaming the real time applications, sensor networks, IOT which need high speed and reliable internet connection. In this paper, a novel load balancing algorithm has been proposed over a novel architectural model in the Fog Computing environment. The proposed model aims to serve the real-time tasks within their deadline. In addition, it serves the different soft tasks without starving. The soft tasks are classified according to the execution time and the priority levels. In addition, they are served according to their waiting time and priority-level. Furthermore, the proposed algorithm is employed to maximize the throughput, the resources and the network utilization and preserving the data consistency with less complexity to accomplish the end users demand.

Бесплатно

Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET

Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET

G.Usha, K.Mahalakshmi

Статья научная

Adhoc networks uses mobile nodes to communicate among itself in which it does not have any fixed infrastructure like access point or base station. Due to dynamic network topology MANET security is a challenging task. Most of the routing protocols in MANET assumes a cooperative environment for communication. But, in the presence of malicious nodes, providing security to MANET is critical issue. Due to the increasing applications of MANET building an effective intrusion detection system are essential. This paper addresses using an intelligent approach for intrusion detection in MANET using cross layer technique. We show an paradigm of SVMs, FDAs and AIS approaches for intrusion detection in terms of classification accuracy.

Бесплатно

Machine Learning Elman Technique for Predicting Shelf Life of Burfi

Machine Learning Elman Technique for Predicting Shelf Life of Burfi

Sumit Goyal, Gyanendra Kumar Goyal

Статья научная

Elman artificial neural network single and multilayer computerized models were developed for predicting the shelf life of burfi stored at 30ºC. The experimental data of the product relating to moisture, titratable acidity, free fatty acids, tyrosine, and peroxide value were taken as input variables, and overall acceptability score as output variable for developing the models. Bayesian regularization algorithm was applied as training algorithm for neural network. Transfer function for hidden layers was tangent sigmoid; while for output layer it was pure linear function. Elman model with a combination of 5→10→1 and 5→7→7→1 performed exceedingly well for predicting the shelf life of burfi.

Бесплатно

Malware Propagation on Social Time Varying Networks: A Comparative Study of Machine Learning Frameworks

Malware Propagation on Social Time Varying Networks: A Comparative Study of Machine Learning Frameworks

A.A. Ojugo, E. Ben-Iwhiwhu, O. Kekeje, M.O. Yerokun, I.J.B. Iyawa

Статья научная

Significant research into the logarithmic analysis of complex networks yields solution to help minimize virus spread and propagation over networks. This task of virus propagation is been a recurring subject, and design of complex models will yield modeling solutions used in a number of events not limited to and include propagation, dataflow, network immunization, resource management, service distribution, adoption of viral marketing etc. Stochastic models are successfully used to predict the virus propagation processes and its effects on networks. The study employs SI-models for independent cascade and the dynamic models with Enron dataset (of e-mail addresses) and presents comparative result using varied machine models. Study samples 25,000 emails of Enron dataset with Entropy and Information Gain computed to address issues of blocking targeting and extent of virus spread on graphs. Study addressed the problem of the expected spread immunization and the expected epidemic spread minimization; but not the epidemic threshold (for space constraint).

Бесплатно

Mathematical Framework for A Novel Database Replication Algorithm

Mathematical Framework for A Novel Database Replication Algorithm

Sanjay Kumar Yadav, Gurmit Singh, Divakar Singh Yadav

Статья научная

In this paper, the detailed overview of the database replication is presented. Thereafter, PDDRA (Pre-fetching based dynamic data replication algorithm) algorithm as recently published is detailed. In this algorithm, further, modifications are suggested to minimize the delay in data replication. Finally a mathematical framework is presented to evaluate mean waiting time before a data can be replicated on the requested site.

Бесплатно

Mathematical Model for Adaptive Technology in E-learning Systems

Mathematical Model for Adaptive Technology in E-learning Systems

Nataliia Barchenko, Volodymyr Tolbatov, Tetiana Lavryk, Viktor Obodiak, Igor Shelehov, Andrii Tolbatov, Sergiy Gnatyuk, Olena Tolbatova

Статья научная

The emergence of a large number of e-learning platforms and courses does not solve the problem of improving the quality of education. This is primarily due to insufficient implementation or lack of mechanisms for adaptation to the individual parameters of the student. The level of adaptation in modern e-learning systems to the individual characteristics of the student makes the organization of human-computer interaction relevant. As the solution of the problem, a mathematical model of the organization of human-computer interaction was proposed in this work. It is based on the principle of two-level adaptation that determines the choice of the most comfortable module for studying at the first level. The formation of an individual learning path is performed at the second level. The problem of choosing an e-module is solved using a fuzzy logic. The problem of forming a learning path is reduced to the problem of linear programming. The input data are the characteristics of the quality of student activity in the education system. Based on the proposed model the computer technology to support student activities in modular e-learning systems is developed. This technology allows increasing the level of student’s cognitive comfort and optimizing the learning time. The most important benefit of the proposed approach is to increase the average score and increase student satisfaction with learning.

Бесплатно

Mathematical Modeling and Analysis of Network Service Failure in DataCentre

Mathematical Modeling and Analysis of Network Service Failure in DataCentre

Malik UsmanDilawar, FaizaAyub Syed

Статья научная

Malik UsmanDilawar, FaizaAyub Syed

Бесплатно

Mathematics Is Science: A Topic Revisited in Context of FCS of India

Mathematics Is Science: A Topic Revisited in Context of FCS of India

Vinay Kumar

Статья научная

Mathematics is universally accepted as mother of all science. Despite that, Department of Personnel and Training (DOPT) has recently issued a circular mentioning that a person having master degree in mathematics cannot be considered for the post of scientists. The open question of 'Is mathematics a science?' is revisited in this paper under the new perspective to explore scientific practices that sans mathematics arrived knocking, challenging basic understanding of precision and practical sense that makes science. Considering the fact that in India, most crucial policy decisions at a higher level of abstraction in every conceivable arena of our national life are taken by either GOM (Group of Ministers) or GOS (Group of Secretaries), apprehension raises a basic query 'Who decides?' Some decision causes much unexpected consequence, which is noticed when it takes its toll and becomes virtually irreversible. This recent decision of Flexible Complementing Scheme (FCS), wherein mathematics is not considered as science, has potential to damage the very scientific culture and practices in India. This paper is an attempt to place mathematics in its right perspective and to highlight the damage that this decision might do. The paper also suggests ways to control the damage.

Бесплатно

Matrix Based Energy Efficient Scheduling With S-MAC Protocol in Wireless Sensor Network

Matrix Based Energy Efficient Scheduling With S-MAC Protocol in Wireless Sensor Network

Ram Kumar Singh,Akanksha Balyan

Статья научная

Communication is the main motive in any Networks whether it is Wireless Sensor Network, Ad-Hoc networks, Mobile Networks, Wired Networks, Local Area Network, Metropolitan Area Network, Wireless Area Network etc, hence it must be energy efficient. The main parameters for energy efficient communication are maximizing network lifetime, saving energy at the different nodes, sending the packets in minimum time delay, higher throughput etc. This paper focuses mainly on the energy efficient communication with the help of Adjacency Matrix in the Wireless Sensor Networks. The energy efficient scheduling can be done by putting the idle node in to sleep node so energy at the idle node can be saved. The proposed model in this paper first forms the adjacency matrix and broadcasts the information about the total number of existing nodes with depths to the other nodes in the same cluster from controller node. When every node receives the node information about the other nodes for same cluster they communicate based on the shortest depths and schedules the idle node in to sleep mode for a specific time threshold so energy at the idle nodes can be saved.

Бесплатно

Mean-Field Theory in Hopfield Neural Network for Doing 2 Satisfiability Logic Programming

Mean-Field Theory in Hopfield Neural Network for Doing 2 Satisfiability Logic Programming

Saratha Sathasivam, Shehab Abdulhabib Alzaeemi, Muraly Velavan

Статья научная

The artificial neural network system's dynamical behaviors are greatly dependent on the construction of the network. Artificial Neural Network's outputs suffered from a shortage of interpretability and variation lead to severely limited the practical usability of artificial neural networks for doing the logical program. The goal for implementing a logical program in Hopfield neural network rotates rounding minimizing the energy function of the network to reaching the best global solution which ordinarily fetches local minimum solution also. Nevertheless, this problem can be overcome by utilizing the hyperbolic tangent activation function and the Boltzmann Machine in the Hopfield neural network. The foremost purpose of this article is to explore the solution quality obtained from the Hopfield neural network to solve 2 Satisfiability logic (2SAT) by using the Mean-Field Theory algorithm. We want for replacing the real unstable prompt local field for the separate neurons into the network by its average local field utility. By using the solution to the deterministic Mean-Field Theory (MFT) equation, the system will derive the training algorithms in which time-consuming stochastic measures of collections are rearranged. By evaluating the outputs of global minima ratio (zM), Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Mean Absolute Percentage Error (MAPE) with computer processing unit (CPU) time as benchmarks, we find that the MFT theory successfully captures the best global solutions by relaxation effects energy function.

Бесплатно

Measures for the Ontological Relations in Enterprise

Measures for the Ontological Relations in Enterprise

Sabria Hadj Tayeb, Myriam Noureddine

Статья научная

In order to improve a system performance, it is significant to estimate the exchange rate of relationships between components of the system, in particular when the considered system is production or service companies. Indeed, bad and inappropriate relationships can generate dysfunctions, slowdowns or, more generally, loss of performance in enterprise leading to a decline in growth and competitiveness. Because of the heterogeneity of information and data, it is necessary to modeling relationships and ontologies are currently among the most evoked models in knowledge engineering. The aim is to define structured vocabularies, bringing together useful concepts of a domain and their relationships thus serving to organize, exchange information in an unambiguous way. Ontologies are widely applied to ensure semantic interoperability describing the enterprise structure and the exchange rate of existing relationships can be valued through their degree of effectiveness. This paper presents measures for the ontological relations in the enterprise. Our approach aims first to extract the set of relationships from an ontology previously created, then classify these relations, according to two types giving a weighting to calculate their degree of effectiveness. The implementation process is proposed on the local enterprise of steel wire drawing processing, giving degree of effectiveness for existing relationships. A sensitivity analysis is done to compare and interpret the different results.

Бесплатно

Measuring of Software Maintainability Using Adaptive Fuzzy Neural Network

Measuring of Software Maintainability Using Adaptive Fuzzy Neural Network

Mohammad Zavvar, Farhad Ramezani

Статья научная

Software maintenance mainly refers to the process of correcting software after delivery. Maintenance process is usually a high percentage of Organizational effort to the whole process of software programs. As a result, the effectiveness of the entire production process and customer satisfaction is dependent on the effectiveness of maintenance activities. Because many factors including type of service, type of product and human factors is dependent on the maintenance process, And the imprecise nature of qualitative factors and sub-criteria leading software maintenance, accurate assessment can be maintained in order to measure the effectiveness of programs seem highly desirable. In this paper, using adaptive fuzzy neural network to provide a method for evaluating the capability of software maintenance conducted after the tests, the root mean square error of the proposed method was equal to 0.34331. The results show that the method is based on adaptive fuzzy neural, maintainability software performance evaluation is appropriate.

Бесплатно

Measuring the Performance of e-Primary School Systems in Bangladesh

Measuring the Performance of e-Primary School Systems in Bangladesh

Wahiduzzaman Khan, Md. Mahbobor Rahaman

Статья научная

The government of Bangladesh (GoB) recently have introduced the concept of Digital Bangladesh. Education is one of the most vital sectors to make the digital nation. For that reason, the GoB has started to convert primary to e-primary schools. The main objective of this study is to investigate the current Information and Communication Technology (ICT) implementation status in e-primary schools by the GoB. The study is quantitative in nature. The study also develops an ICT implementation status model from the e-primary school systems in Bangladesh. This model has identified the ICT equipment, analyzed the ICT support & equipment, given weighted to each factor and investigated the current state of ICT implementation of e-primary schools in Bangladesh. The study has taken 800 sample schools from 8 divisions to investigate the current ICT implementation status. The study suggested that before implementing the ICT they will make sure all the infrastructure of ICT is available in those primary schools.

Бесплатно

Medical Students Dynamic Effort on Understanding of RNAi Therapeutic Application in Sri Lanka

Medical Students Dynamic Effort on Understanding of RNAi Therapeutic Application in Sri Lanka

Faiz MMT Marikar, Manel BCN Kulugammana, Karawitage RL Karawita, Aravinda S Jayathilake, Ayesh U Hettiarachchi, Kesaven Kalainesan, Eranda I Kumara, Kodithuwakkulage MP Kumara

Статья научная

This study examines students' understanding of the normative connections between key concepts of genetics, and RNAi and underlying biological principles that are critical for an in-depth understanding of RNAi therapeutic application on Medical field. Using a structural questionnaire, we examine randomly selected Medical faculty students' understanding of genetic relationships at Faculty of Medicine and Allied Sciences, University of Rajarata, Sri Lanka. A total of 80 Medical faculty students participated in this study and completed written questionnaire on genetics and RNAi therapeutic application. Findings from this study were there is a strong positive response on basic genetics studies in this content, but when it considers knowledge on RNAi and new technology based on RNAi therapeutic application is poorly understood. Almost all the students had a good knowledge on DNA but not the relationship between gene and DNA. Specifically, students were requested to demonstrate an integrated understanding of the RNAi therapeutic application, almost 96% of them unable to give an example for it, and also some students struggled to explain it. Outcome of this study is preliminary in nature; the results provide a glimpse of genetics education in Sri Lanka need to uplift.

Бесплатно

Meta-analysis of systematic literature review methods

Meta-analysis of systematic literature review methods

Iman Tikito, Nissrine Souissi

Статья научная

Plenty data are generated each second under different locations and ways. In return, several valuable data are not used due to neglect or a wrong criteria selec-tion, affecting the results. To have the accurate decision the exact information is needed. But, in case of lack of data, an overall vision about all existing findings make a big difference especially in Medicine. The approach of Systematic Literature Review give the possibility to have this clear vision related to a specific topic, for the right input. We aim to identify all important steps to conduct a high quality of systematic literature review, independently of research domain. We first explain the reason behind our research and the significance of Systematic Literature Review in research fields, one of the way for minimizing the loss of infor-mation. Since our goal is to have an explicit methodolo-gy, we select several papers mentioning the procedure in different years to have a general view. Subsequently, we explain the approaches used to select the key steps to follow for selected articles. We settle this study with a complete step resuming all finding key phases. This research highlight also the im-portance of the use of an explicit methodology to vanish any misunderstanding or ignoring basic points to accom-plish a valuable and high quality work. This paper make a clear complete methodology to fol-low, in any domain and specially medicine, to conduct a best quality of Systematic Literature Review and reach the right gain using best practices.

Бесплатно

Methods of processing context in intelligent systems

Methods of processing context in intelligent systems

Iryna Zavuschak

Статья научная

Context-based methods represent an important part of toolkit used to build intelligent systems. In the article existent definitions of context for a system with a single decision making agent were discussed. Available formal models for context data representation and processing were compared. The approaches for different forms of reasoning within context were analyzed. Also the application of context awareness in systems with situation awareness is discussed. In the article unresolved problems and tasks in the domain of context aware computing are delineated.

Бесплатно

Mining the dark web: a novel approach for placing a dark website under investigation

Mining the dark web: a novel approach for placing a dark website under investigation

Bassel Alkhatib, Randa S. Basheer

Статья научная

In the last two decades, illicit activities have dramatically increased on the Dark Web. Every year, Dark Web witnesses establishing new markets, in which administrators, vendors, and consumers aim to illegal acquisition and consumption. On the other hand, this rapid growth makes it quite difficult for law and security agencies to detect and investigate all those activities with manual analyses. In this paper, we introduce our approach of utilizing data mining techniques to produce useful patterns from a dark web market contents. We start from a brief description of the methodology on which the research stands, then we present the system modules that perform three basic missions: crawling and extracting the entire market data, data pre-processing, and data mining. The data mining methods include generating Association Rules from products’ titles, and from the generated rules, we infer conceptual compositions vendors use when promoting their products. Clustering is the second mining aspect, where the system clusters vendors and products. From the generated clusters, we discuss the common characteristics among clustered objects, find the Top Vendors, and analyze products promoted by the latter, in addition to the most viewed and sold items on the market. Overall, this approach helps in placing a dark website under investigation.

Бесплатно

Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View

Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View

A.A. Ojugo, A.O. Eboka

Статья научная

Data transfer over the Internet comes with its range of challenges and associated prospects as a major milestone in the convergence of information and communication technology (ICT). Campus network implemented on IP-telephony defines a range of convergence technologies and applications that refers to a multi-service network that allows integration of data, audio, voice, and video solutions onto a converged infrastructure so that data can be transported via the use of open-source applications, protocols, hardware, and software. The study adopts the Federal College of Education Technical Asaba. It is observed that some issues in its implementation include packet loss, jitters, and latency. Jitters and packet loss can be curbed via an increased bandwidth allocation; while latency is minimized via constant upgrade in network infrastructure to increase speed. Overall, the proposed network seeks to provide its users with mobility, resilience, economy, flexibility, and productivity. Its results recommends that organizations wishing to harness its potentials should join forums and user-groups that will constantly update their knowledge in a bid to help them improve the efficiency and effectiveness of their infrastructure implementation.

Бесплатно

Mobile Communication Evolution

Mobile Communication Evolution

Kuboye Bamidele Moses

Статья научная

Presently, there is a wide establishment of mobile computing across the globe and the number of subscribers worldwide including Nigeria is on the increase every day. It started with mobile voice communication and has gradually been extended to the capability of sending and receiving data across the cellular networks. Also, the coming of this technology has changed the face of business all over the world and will soon dominate all strata of the society. Therefore, this paper is looking at the past, present and the future of this technology, the areas of applications and vectors of mobility that are likely to shape the future of the technology. The reviews of the mobile computing technology from the First generation (1G) to fourth (4G) are presented. The relationships of the generations were presented. The issues relating to the emergence of new technology are also reviewed. The interworking of the technologies and how they helped in promoting the mobile technologies were also reviewed. The deployments issues from First generation (1G) to 3G and later to 4G are presented. The paper has reviewed how each of the technology came to being and thus served as an eye opener to those people that are not acquainted with these technologies.

Бесплатно

Журнал