Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

Psychometric Analysis Using Computational Intelligence for Smart Choices

Psychometric Analysis Using Computational Intelligence for Smart Choices

Vidushi Singla, Rashi Thareja, Reema Thareja

Статья научная

Currently with world's industries providing endless job varieties, it is getting difficult for the students to choose optimum career lines. Ranging from 16-24 years old, these age groups find themselves unable to recognize their future endeavors. Hence, psychometric tests provide a solution, helping them to recognize their interests, aptitude and personality traits to produce better results. The research process was facilitated by questionnaires involving verbal, spatial, logical, critical and numerical aptitude. The responses were analyzed using statistical techniques, and machine learning algorithms. A number of graphs were plotted for better understanding of the technical details. The proposed psychometric and aptitude analysis model entails accuracy calculation assigning K-means, KNN, confusion matrices and SVM plots. The results of the psychometric analysis gave broad spectra of career choices by studying the pattern of the choices selected by the people. Respondents were supposed to give information about their interests and perceptions in their day to day activities, which in turn reflect information about their inner humanly traits, unknowingly providing an ideal career path.

Бесплатно

Quality Implication for Prognoses Success in Web Applications

Quality Implication for Prognoses Success in Web Applications

Ruqia Bibi, Munazza Jannisar, Mamoona Inayet

Статья научная

Massive increase in usage of World Wide Web makes it affective in every domain of life. Billions of people from different corners of world use internet for diverse purposes on daily bases. Quality acts as important key factor for web applications. Various methodologies have been proposed and many techniques have been deployed but, quality still lags behind. Our study in-focuses a detailed survey based on methodologies, metrics and architecture that are used in modeling of web application. We carried out analysis and comparisons between techniques and evaluate major quality characteristics. Study at conclusion illustrates that beside functional requirements, non-functional requirements are also essential and acts as backbone for quality in web based applications.

Бесплатно

Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective

Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective

Suhel Ahmad Khan, Mohd Nadeem, Alka Agrawal, Raees Ahmad Khan, Rajeev Kumar

Статья научная

The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.

Бесплатно

Question Answering for Collaborative Learning with Answer Quality Predictor

Question Answering for Collaborative Learning with Answer Quality Predictor

Kohei Arai, Anik Nur Handayani

Статья научная

The increasing advances of Internet Technologies in all application domains have changed life styles and interactions. With the rapid development of E-Learning, collaborative learning is an important for teaching, learning methods and strategies. Studies over the years shown that students had actively and more interactively involved in a classroom discussion to gain their knowledge. Students can ask their questions to the classroom discussion when they want to collaborate with others, asking one another for information, evaluating one another’s ideas. Therein, the activity allowing one question has many answer or information that should be selected. Every answer has a weighting and its very subjective to select it. In this paper, we introduce question answering for collaborative learning with answer quality predictor. By using answer quality predictor the quality of the information could be determined. Through the process of collaborative learning, the knowledge base will be enriched for future question answering. Further, not only the student could get answers form others but also provided by the system.

Бесплатно

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Neha Solanki, Sanjay K. Malik

Статья научная

Medical Image Watermarking has been considered as an appropriate method for enhancing the data security and content verification in medical science. For the purpose of achieving better security it is recommended to hide the data in the medical image itself that will improve the reliability of medical information system. In our paper, the work is divided in two main stages, first of all image is divided into two parts: Region of Interest that is defined as informational part of image and Region of Non Interest that is defined as non-informational part. In our work we have used Region of Non Interest to hide the data so that the informational part of the image kept safe. Watermark is encrypted by using RSA. A Discrete Wavelet Transform based approach is used for embedding the encrypted data in Region of Non Interest part of image for enhancing data security. The experimental result shows that watermark embedded by the proposed algorithm provides better security and can survive successfully under different attacks.

Бесплатно

Radial Basis Function and K-Nearest Neighbor Classifiers for Studying Heart Rate Signals during Meditation

Radial Basis Function and K-Nearest Neighbor Classifiers for Studying Heart Rate Signals during Meditation

Ateke Goshvarpour, Atefeh Goshvarpour

Статья научная

Meditation refers to a family of self-regulation practices that focus on training attention and awareness in order to bring mental processes under greater voluntary control. The aim of this study is to evaluate the efficiency of two different classifiers, k-Nearest Neighbor (k-NN) and Radial Basis Function (RBF), on the heart rate signals in a specific psychological state. For this purpose, two types of heart rate time series (before, and during meditation) of 25 healthy women are collected in the meditation clinic in Mashhad. The spectral parameters are used to gain insight into the autonomic nervous system (ANS) response induced by meditation. Therefore, very low frequency, low frequency, high frequency, the LF/HF ratio and frequency of the highest spectral peak of heart rate signals are extracted and used as inputs of the classifiers. To evaluate performance of the classifiers, the classification accuracies and mean square error (MSE) of the classifiers were examined. The classification results of this study denote that the RBF classifier trained on spectral features obtains higher accuracy than that of k-NN classifier. The total classification accuracy of the RBF classifier is 92.3% with 0.026 classification error. However, k-Nearest Neighbor classifier gives encouraging results (86.5%). Experimental results verify that radial basis function is an efficient classifier for classifying heart rate signals in a specific psychological state.

Бесплатно

Rainfall Forecasting to Recommend Crops Varieties Using Moving Average and Naive Bayes Methods

Rainfall Forecasting to Recommend Crops Varieties Using Moving Average and Naive Bayes Methods

Muhammad Resa Arif Yudianto, Tinuk Agustin, Ronaldus Morgan James, Firstyani Imannisa Rahma, Arham Rahim, Ema Utami

Статья научная

Indonesia has been known as an agrarian country because of its fertile soil and is very suitable for agricultural land, including rice. Yogyakarta is one of the most significant granary regions in Indonesia, especially in the Sleman region. However, one of the main challenges in rice planting in recent years is the erratic rainfall patterns caused by climate anomalies due to the El Nino and La Nina phenomena. As a result of this phenomenon, farmers have difficulty determining planting time and harvest time and planting other plants. Therefore, we make rainfall predictions to recommend planting varieties with Moving Average and Naive Bayes Methods in Sleman District. The results showed that moving averages well use in predicting rainfall. From these results, we can estimate that in 2020 rice production will below. That can saw from the calculation of the probability of naive Bayes on rice plants being low at 0.999 and 0.923. So that the recommended intercrops planted in 2020 are corn and peanuts. We also find that rainfall prediction with Moving Average using data from several previous years in the same month is more accurate than using data from four past months or periods.

Бесплатно

Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding

Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding

Ravpreet Kaur, Manish Mahajan

Статья научная

Due to an aggressive development and covert transmission of the computer users over the web, the steganography is acquiring its vogue day by day. It is the method to encode the covert data in a transmission medium in a fashion that the actuality of data must remain hidden. To protect the integrity of the data over the internet becomes necessary for the high sensitivity communications or the data transfers. The steganography carries a number of options for the embedding of the secret data into the cover data. In this manuscript, we have proposed the hybrid representation for the embedding of the data, which utilizes the random pattern embedding along with the cryptography for the higher steganography security levels. The proposed model has been designed to enhance the security level by utilizing the sequential data encoding and decoding in the video data. The video embedding creates the higher level of security for the embedded data. The experimental results have been obtained in the form of the embedding capacity, mean squared error (MSE) and Bits per Pixel (BPP). The proposed model has been found to be efficient enough for the video steganography.

Бесплатно

Rankings in Sport by Pairwise Comparison and League Table

Rankings in Sport by Pairwise Comparison and League Table

Sebastian Sitarz

Статья научная

This article describes a method of creating rankings in sport (medal tables). First, the countries are pairwise compared by area of the feasible points for which they are better. These feasible points correspond to gold, silver and bronze medals. After pairwise comparison we use the method of league table to rank the countries.

Бесплатно

Real-time Corresponding and Safety System to Monitor Home Appliances based on the Internet of Things Technology

Real-time Corresponding and Safety System to Monitor Home Appliances based on the Internet of Things Technology

Nalinsak Gnotthivongsa, Huangdongjun, Khamla Non Alinsavath

Статья научная

Smart Home is a versatile system that incorporates several elements, i.e., visual intercom, home security, remote monitoring of home appliances, remote video surveillance, care systems and online education systems. The basic goal of a smart home is to connect various information-related communication devices, household appliances and home security devices in the home, to an intelligent system for centralized or remote monitoring, control and family affairs management. IoT refers to the infrastructure of connected physical devices, which is growing at a rapid rate, as a huge number of devices and objects are getting connected to the Internet. Internet of Things (IoT) is a significant part of the smart home scenario. It performs information exchange and communication between the home environment and smart system, through multiple sensors, such as photoelectric sensors, radio frequency identification, and so on. Its purpose is to realize real-time connection between objects and objects, objects and people, all items and networks, and to facilitate identification, management and control. This proposed paper presents a smart home application to support real-time correspondence to reduce the cost of implementation, to pursue life intelligence and comfort, with the hope that the system is able to provide a much more convenient and efficient energy saving consumption for the daily activities of the family. Having this application helps a lot of user to know the real-time notification in case of emergency occurs within the house, the advanced feathers of this application consisting of monitoring, control system and information support system as one stop-service application in order to assist user to know more environment context and being intermediate between user and home appliances. For example, if someone forgets to turn off the light when they are out of the home, and all other home appliances are active without being used. As such, a smart home, or home automation, which induces technology for the home atmosphere provides ease of use and the necessary protection to its occupants.

Бесплатно

Recent and frequent informative pages from web logs by weighted association rule mining

Recent and frequent informative pages from web logs by weighted association rule mining

SP. Malarvizhi

Статья научная

Web Usage Mining provides efficient ways of mining the web logs for knowing the user’s behavioral patterns. Existing literature have discussed about mining frequent pages of web logs by different means. Instead of mining all the frequently visited pages, if the criterion for mining frequent pages is based on a weighted setting then the compilation time and storage space would reduce. Hence in the proposed work, mining is performed by assigning weights to web pages based on two criteria. One is the time dwelled by a visitor on a particular page and the other is based on recent access of those pages. The proposed Weighted Window Tree (WWT) method performs Weighted Association Rule mining (WARM) for discovering the recently accessed frequent pages from web logs where the user has dwelled for more time and hence proves that these pages are more informative. WARM’s significance is in page weight assignment for targeting essential pages which has an advantage of mining lesser quality rules.

Бесплатно

Recommendation Techniques in Mobile Learning Context: A Review

Recommendation Techniques in Mobile Learning Context: A Review

Nassim DENNOUNI, Zohra SLAMA, Yvan PETER, Luigi LANCIERI

Статья научная

The objective of this article is to make a bibliographic study on the recommendation of learning activities that can integrate user mobility. This type of recommendation makes it possible to exploit the history of previous visits in order to offer adaptive learning according to the instantaneous position of the learner and the pedagogy of the guide. To achieve this objective, we review the existing literature on the recommendation systems that integrate contexts such as geographic location and training profile. Next, we are interested in the social relationships that users can have between themselves. Finally, we focus on the work of recommending mobile learning activities in the context of scenarios of field trips.

Бесплатно

Reform of Database Course in Police Colleges Based on "Working Process"

Reform of Database Course in Police Colleges Based on "Working Process"

Gao Jian

Статья научная

According to the actual research results, combined with the teaching experience, this paper puts forward the reform method of the database course in police colleges. Based on the actual sector capacity requirement analysis, design of the five learning steps and four teaching scene, the task driven, project oriented, make students doing, learning by doing, students are required in the network security supervision work in the operation skill and ability.

Бесплатно

Relationship between Middle School Students' Frequency of Participation in Lab Activities and Scientific Epistemological Beliefs: Turkish Case

Relationship between Middle School Students' Frequency of Participation in Lab Activities and Scientific Epistemological Beliefs: Turkish Case

Hatice Esma OZBAY, Mustafa Serdar KÖKSAL

Статья научная

The purpose of this study is to investigate relationship of fifth, sixth, seventh and eighth grade students' scientific epistemological beliefs with their frequency of participating in laboratory activities. For this purpose, correlational study method was used. Sample of the study involved 301 students purposively selected from convenient schools. The data of the study was collected by a Likert type scale called "Scientific Epistemological Beliefs Scale" and information form about frequency of participating in laboratory activities and description of sample laboratory activities. The findings showed that majority of the students never participated in lab activities or participated in one time during one year. Also the fifth, sixth, seventh and eighth grade students' scientific epistemological beliefs were significantly related to their frequency of participating in laboratory activities. They are positively correlated to each other. However there were no significant relationships between the students' scientific epistemological beliefs and their frequency of participating in laboratory activities. Hence it can be claimed that participating in lab activities is associated with development of sophisticated scientific epistemological beliefs.

Бесплатно

Reproducing an Alternative Model of Intercultural Sensitivity for Undergraduates from Taiwan and Hainan

Reproducing an Alternative Model of Intercultural Sensitivity for Undergraduates from Taiwan and Hainan

Jia-Fen Wu

Статья научная

An alternative model of intercultural sensitivity replicated from Chen and Starosta's five-factor model of Intercultural sensitivity was replicated validated at eight universities in Taiwan and Hainan, China. Both Confirmatory factor analysis and exploratory factor analysis were conducted to inspect the construct validity of the alternative model of Intercultural Sensitivity. Results indicated that three models fitted the data and the values of indicators were deemed acceptable; however, three-factor model of intercultural sensitivity with 10 items significantly fitted the data better than Chen and Starosta's five-factor model, Wu's four-factor model, and the revised two-factor model. This three-factor model, an alternative model, consists of three factors based on 10 items from the 24-item Intercultural Sensitivity Scale by Chen and Starosta; the reliability coefficient was .771, demonstrating high internal consistency. Participants from both Taiwan and Hainan represent ethnic Chinese who, although sharing similar cultures, still present cultural differences. This present study suggests an alternative model of the Intercultural Sensitivity that fits the characteristics of a sample of undergraduates from Hainan, China and Taiwan by reproducing Chen and Starosta's ISS.

Бесплатно

Requirement elicitation methods for cloud providers in IT industry

Requirement elicitation methods for cloud providers in IT industry

Muhammad Imran Manzoor, Momina Shaheen, Hudaibia Khalid, Aimen Anum, Nisar Hussain, M. Rehan Faheem

Статья научная

In cloud computing, requirements engineering is a greatly under-researched topic. Requirement elicitation is a key activity that helps in assemble the requirements of a system from different users, customers and stakeholders. Cloud services providers need methods to correctly elicit requirements from consumers, as the consumers of cloud services are more diverse and there occur some conflictions in the non-functional requirement of some kinds of consumers. Sometimes eliciting security requirements is an important task, because the cloud services are acquired by potential cloud consumers are secure for them to use. Both literature and market surveys are performed on different elicitation approaches that are followed by CSPs to fetch consumer requirements, recommendations and data from cloud service providers and from consumers of cloud computing services. This study aims to discuss the elicitation methods being used by cloud providers in Pakistan IT industry, and the resulting feedback of the consumers by these methods. This would lead to determine current elicitation methods are sufficient or there is a need to design a new elicitation method that can sufficiently provide with more customer satisfaction. We have used semi-structured interviews and questionnaires to gather information about the elicitation techniques that are used by cloud providers to elicit consumer requirements. This study is conducted in Pakistan IT industry. Somehow, this research enlightens the trend and scope of cloud computing in Pakistan. This study would be beneficial for cloud providers adequately gather their consumer requirements and enhance the knowledge of elicitation techniques that are used by cloud providers.

Бесплатно

Requirements Engineering in Software Houses of Pakistan

Requirements Engineering in Software Houses of Pakistan

Waqas Ali, Adeel Rafiq, Muhammad Nadeem Majeed

Статья научная

Requirement engineering is an essence of software development life cycle. The more time we spend on requirement engineering, higher the probability of success. Effective requirement engineering ensures and predicts successful software product. This paper presents the adaptation of requirement engineering practices in small and medium size companies of Pakistan. The study is conducted by questionnaires to show how much of requirement engineering models and practices are followed in Pakistan.

Бесплатно

Research Supervisor Recommendation System Based on Topic Conformity

Research Supervisor Recommendation System Based on Topic Conformity

Ridwan Rismanto, Arie Rachmad Syulistyo, Bebby Pramudya Citra Agusta

Статья научная

In a higher education such as universities, final project are under supervision of one or more supervisors with a similar research interest or topic. The determination of the final project supervisor is an important factor in the work of the student's final project. However, the lack of information about the supervisor can hamper students in making the determination of the supervisor. Thus, a system is needed that can facilitate students in determining the final project or thesis advisors in accordance with the research topic. This problem is the basis of this research. The study is conducted by developing a web-based system and applying the TF-IDF word weighting and cosine similarity method. TF-IDF method is a way to give the weight of the relationship of a word to the document. The cosine similarity is a method for calculating the similarity between two objects expressed in two vectors by using keywords from a document as a measure. The results of the advisor recommendation system can provide recommendations to students regarding the final assignment advisor who has conducted research in accordance with the topic of the student's final assignment written in Indonesian. In 20 testing, the accuracy of the comparison of the results of the system recommendations with the actual data obtained an average of 75% by comparing system recommendation with actual assigned supervisor.

Бесплатно

Research of Heated Oil Pipeline Shutdown and Restart Process Based on VB and MATLAB

Research of Heated Oil Pipeline Shutdown and Restart Process Based on VB and MATLAB

Changjun Li, Xia Wu, Wenlong Jia

Статья научная

During the operation of a heated oil transportation pipeline, the shutdown was caused by some pipeline accidents and repairing. In order to ensure the safety operation of the pipeline, determine the temperature drop and restart pressure was needed at different shutdown is important. This paper builds the heated oil pipeline temperature drop model after shutdown based on the unsteady heat transfer theory and restart model based on fluid transient flow theory. In order to solve the models, MATLAB is adopted a code for the models solving program. VB and MATLAB hybrid programming method which is on the basis of COM technical is utilized to develop a friendly man-machine interface for the heated oil pipeline shutdown and restart simulation software. The practical application shows using of VB and MATLAB hybrid programming method can reduce the work of algorithm developing and enhance the reliability of heated oil pipeline shutdown and restart simulation software.

Бесплатно

Research on Bilingual Teaching of Graduates for Computer Specialty in Financial and Economical Colleges

Research on Bilingual Teaching of Graduates for Computer Specialty in Financial and Economical Colleges

Limin Wang, Xuming Han, Ming Li

Статья научная

To achieve higher education internationalization and improve the comprehensive ability of graduates, according to the education characteristics and development model of graduates for computer specialty in financial and economical colleges, the intrinsic relation between computer and English, and the importance of graduates for implementing bilingual teaching in financial and economical colleges, an effective training project of bilingual teaching for computer graduates in financial and economical colleges is proposed in this paper, which is based on years of teaching experience in practice and suitable for the economy development demands in China. In addition, a more perfect measure for computer graduates in financial and economical colleges is also introduced in this paper, so that the education of computer graduates in financial and economical colleges is different from the computer specialty in comprehensive universities. It can build a good basis and provide a feasible approach to training the comprehensive talents by performing bilingual teaching that are needed urgently in international communities.

Бесплатно

Журнал