Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

Research on Cultivation of Ethnic Minorities IT Talents in Nationalities Universities

Research on Cultivation of Ethnic Minorities IT Talents in Nationalities Universities

Shuang Liu, Peng Chen

Статья научная

To promote cultural and information undertakings of the ethnic minorities such as digital publication and network governance, a series of experience training programs for nationalities universities are established to cultivate high-quality IT technology talents. Here, Dalian Nationalities University is taken as an example. These training programs adopted a so called "four-phrases, five capabilities" training method. That is, four phrases consist of professional quality training, professional basic theory strengthening, job skills training and job practice, centering on training five capabilities of professional morality, software programming fundamentals, language competence, software engineering and project practice. Based on the training method, one well-rounded and multiple perspective assessment method are put forward. This assessment system integrated academic knowledge evaluation and professional competence assessment, adopting various forms such as coding, competition, discussion, peer review online and deliverables exhibition. These practice training courses break through the knowledge barrier and put emphasis on professional competence cultivation, which improves teaching quality and assesses learning effects objectively and fairly during teaching process.

Бесплатно

Research on Five Stakeholders & Five Relationships of Higher Engineering Education in China

Research on Five Stakeholders & Five Relationships of Higher Engineering Education in China

Guangshe Jia, Chengbin Xiao

Статья научная

With the development of globalization, higher engineering education has been on the rise which includes five Stakeholders and five relationships. This paper will discuss five relations of higher engineering education: teaching, research and social services, professional education and humanity education, ability education and knowledge education, theoretical teaching and practical teaching, development of education and development of national and regional economy. Among them, teaching, research and social services are three major functions of higher engineering universities; professional education and humanity education, ability education and knowledge education, theoretical teaching and practical teaching are the goals of higher engineering education; development of education and development of national and regional economy involve the interaction between higher engineering universities and society. Furthermore, the five stakeholders are students, teachers, universities, employers and governments. The five relationships and five stakeholders of higher engineering education are reunified firstly, and at the same time, the driving force of various interests of higher engineering education is analyzed thoroughly at the higher level for guiding and enlightening the future development of our country’s higher engineering education.

Бесплатно

Research on Fuzzy Comprehensive Evaluation in Practice Teaching Assessment of Computer Majors

Research on Fuzzy Comprehensive Evaluation in Practice Teaching Assessment of Computer Majors

Shuang Liu, Peng Chen

Статья научная

Practice teaching is an inseparable part of professional courses for computer majors, which helps to cultivate capability of coding and engineering for students. Progress assessment and result assessment are two common ways to assess the practice teaching. But only by class attendance and programming result, it is not scientific and reasonable for all students to get the final assessment result. And it is not scientific to evaluate teaching quality only by classroom observations or instructional supervision too. How to assess the practice teaching from multiple perspectives scientifically is key point of this paper. A new assessment called fuzzy comprehensive evaluation from different targets collecting from five assessment means is adopted to complete the task. Based on five targets of grade 1 and corresponding targets of grade 2, one fuzzy matrix is constructed with membership determining and one quantitative result is obtained based on calculation of fuzzy matrix. This assessment method breaks through the knowledge barrier and puts emphasis on competence assessment and teaching evaluation, which improves teaching quality in the teaching process. Adopting this assessment method, students' learning effects can be assessed objectively and fairly, which will result in inspiring students' passion for independent learning and helping them to build employment challenge self-confidence with optimistic and positive attitudes. And teachers will get effective feedback and professional suggestions from experts, students and management department to improve their practice teaching in the future.

Бесплатно

Research on Marketing Cooperation System Based on Multi-Agent Services Aggregation Driven by Requirement

Research on Marketing Cooperation System Based on Multi-Agent Services Aggregation Driven by Requirement

Hong ZHOU, Yanran XIE, Chengtong YANG

Статья научная

The web service has great significance and value since it represents a large industrial sector and huge trade interests, but the function of a single web service is too small to satisfy the need of service requestor, so it is necessary to combine a mount of simple services to satisfy the complex and dynamic requirement in practice, then the problem of web services composition is one of the research hotspot. This paper generalized the primary interaction processes between enterprise and customer in marketing, encapsulated the special function for marketing works as the agent, and considered the marketing as the cooperation process of agents focusing on requirements, and based on that a multi-agent based marketing cooperation system (MAMCS) is established and the agent ontology is designed according to JADE, finally the negotiation mechanism is built. The method of multi-agent services aggregation driven by requirement supposed in this paper can improve the utilizing effect of service, reduce the difficulty of services composition, and realize the automatic purpose of services composition. Moreover, by combining the merits of agent technique the initiation and intelligence of the services are improved, that safeguard the best interests of the service providers due to they have an option on requirements.

Бесплатно

Research on Spacecraft Illumination

Research on Spacecraft Illumination

Bo Cai, Ling Li, Jing Hu, Biao He, Yuan Long, Dengyi Zhang

Статья научная

Illumination analysis of spacecraft is very important. This paper firstly introduces the importance of spacecraft illumination analysis in aerospace fields and points out that illumination conditions will influence the design of shape of spacecraft body and the installation of spacecraft equipments. Then, it discusses two methods for analyzing spacecraft solar-panel shadow and illumination conditions: ray tracing illumination algorithm and polyhedral mesh contour edge projection algorithm and compares their efficiency and feasibility. Shadow area and solar area are computed of every cell on solar panels. We designed solar panel single-axis rotation experiment to validate the proposed algorithm. The experimental results show that contour edge projection algorithm has fine accuracy and costs less time. For detailed illumination information, we apply a practical segment clipping algorithm after some comparisons.

Бесплатно

Research on security situation assessment model of video transmission network

Research on security situation assessment model of video transmission network

Gao Jian, Yue Ting, Zhu RongChen

Статья научная

In this paper, we propose a situation assessment model for video transmission network, which evaluates the security risk of video transmission network information from four aspects: front-end perception layer, transmission layer, application layer and other risks.We divide the video network security evaluation system into three layers, and use AHP to determine the weight of each index.The weights of these four aspects are calculated by analytic hierarchy process.The method proposed in this paper can provide an evaluation system and a calculation method for the safe operation of video transmission network and important systems, and can provide specialized information security services for the construction project of video transmission network.

Бесплатно

Research on the Quick Construction of the Edge-balance Index Sets of a Nested Graph with Infinite Paths and Power Circles

Research on the Quick Construction of the Edge-balance Index Sets of a Nested Graph with Infinite Paths and Power Circles

Hongjuan Tian, Yuge Zheng

Статья научная

The research of Boolean index sets of graphs is one of the most important graph theories in the graph theory . Boolean index sets of graphs are to use the vertex sets and the edge sets of graphs to study the characteristics of various graphs and their inherent characteristics through corresponding the mapping function to Z_2. It’s theory can be applied to information engineering, communication networks, computer science, economic management, medicine, etc. The edge-balance index set is an important issue in Boolean index set. In this paper, we defined edge-friendly labeling of the graph, edge-balance index set of the graph and the graph {[C_(3^m)×P_(m_3)](m≥3)}. we completely determine the edge-balance index sets of the graph [C_(3^m)×P_(m_3)] for the integer [m≡3,0 (mod 4)] and solve formula proof and graphic tectonic methods.

Бесплатно

Resource Allocation Policies for Fault Detection and Removal Process

Resource Allocation Policies for Fault Detection and Removal Process

Md. Nasar, Prashant Johri, Udayan Chanda

Статья научная

In software testing, fault detection and removal process is one of the key elements for quality assurance of the software. In the last three decades, several software reliability growth models were developed for detection and correction of faults. These models were developed under strictly static assumptions. The main goal of this article is to investigate an optimal resource allocation plan for fault detection and removal process of software to minimize cost during testing and operational phase under dynamic condition. For this we develop a mathematical model for fault detection and removal process and Pontryagain's Maximum principle is applied for solving the model. Genetic algorithm is used to find the optimal allocation of fault detection and removal process. Numerical example is also solved for resource allocation for fault detection and remoal process.

Бесплатно

Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing

Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing

Pooja S. Kshirsagar, Anita M. Pujar

Статья научная

Cloud Computing has managed to attract the entire buzz in the growing era of technology due to its on-demand services for resource request. Despite of the enormous growth of cloud computing, there are many problems related to resource allocation in cloud that are still unaddressed. Current work for resource allocation strategy focuses on various methods to place Virtual Machine per appropriate requests. The current state of art focuses on the dynamic nature of the work load on cloud. But there is still scope of improvement in the resource allocation strategies that have been proposed in terms of well-balanced network even at the resource contention. This study proposes a hybrid model composed of lease methodology and dynamic load balancing algorithm, with an attempt to overcome the problems of resource contention and starvation and a well-balanced network even at the input of varying loads. An attempt to increase the CPU utilization and throughput along with no request rejection is taken. The work also retains the lease options for its clients thus maintaining the anti-starvation for pre-emptible requests.

Бесплатно

Reversible Shift Counter Design on QCA

Reversible Shift Counter Design on QCA

Abhinay Choudhary, Snigdha Singh, Manoj Kumar Jain

Статья научная

In the Current scenario of higher level of integration the most encountered problems are heat dissipation and information loss on each and every computation. For the sake of eliminating these issues Reversible computing is being adopted as a preferable substitute of digital circuit design. This paper focuses on the design of Reversible Ring Counter and Twisted Ring Counter using Reversible D flip flop implemented with the Novel Design of Feynman and Fredkin Gate. Ring counters are commonly found in applications used to count the data in a continuous loop as well as in frequency divider circuits. While twisted (or Johnson) ring counter is used as three-phase square wave generators (using 3 flip-flops) and quadrature oscillator circuits (using 2 flip-flops) etc. The response of the proposed counter circuit is tested with the help of QCADesigner 2.0.3 simulation tool and the Energy dissipation is analyzed by the use of QCA Designer-E tool.

Бесплатно

Review Length Aware Hybrid Approach to Sentiment Analysis

Review Length Aware Hybrid Approach to Sentiment Analysis

Babaljeet Kaur, Naveen Kumari

Статья научная

Sentiment analysis is a popular research problem to find out within the natural language processing that is dealing with identifying the sentiments or mood of people's towards elements such as product, text, services and the technology. However, there are few researches conducted on the sentiment analysis of technical article review, so to overcome this deficiency conducts the sentiment analysis over the technical article review and classifying the sentence by overall sentiments that is representing the review is positive or negative. The paper presents the combination of SVM and KNN and find out how much given article sound technically good. The proposed technique is compared with other existing techniques and results shows that the proposed technique is better as compared to the other technique.

Бесплатно

Review of Requirements Management Issues in Software Development

Review of Requirements Management Issues in Software Development

Muhammad Naeem Ahmed Khan, Muhammad Khalid, Sami ul Haq

Статья научная

A requirement is a capability to which a product or service should conform to. A meticulous consideration to requirements engineering acts as a backbone of software projects. Ambiguous and unrealistic requirements are major source of failure in the software-intensive systems. Requirements engineering processes are complex as most of the requirements engineering documentation is written in natural languages which are less formal and often distract the designers and developers. Requirements management is a continuous process throughout the project lifecycle and relates to documenting, analyzing, tracing and prioritizing requirements and then finally controlling changes. The main issues related to requirements management are usually social, political and cultural. Software requirement engineers who gather the requirements generally consider that such issues are beyond the scope of their profession as they deem them within the project management ambit. In this study, we highlight the management issues that arise in the requirements engineering process and explore the possibilities to tackle them amicably. The study is supplemented with a critical review of the existing methodologies for resolving and managing software requirements.

Бесплатно

Review on predicting students’ graduation time using machine learning algorithms

Review on predicting students’ graduation time using machine learning algorithms

Nurafifah Mohammad Suhaimi, Shuzlina Abdul-Rahman, Sofianita Mutalib, Nurzeatul Hamimah Abdul Hamid, Ariff Md Ab Malik

Статья научная

Nowadays, the application of data mining is widely prevalent in the education system. The ability of data mining to obtain meaningful information from meaningless data makes it very useful to predict students’ achievement, university’s performance, and many more. According to the Department of Statistics Malaysia, the numbers of student who do not manage to graduate on time rise dramatically every year. This challenging scenario worries many parties, especially university management teams. They have to timely devise strategies in order to enhance the students’ academic achievement and discover the main factors contributing to the timely graduation of undergraduate students. This paper discussed the factors utilized by other researchers from previous studies to predict students’ graduation time and to study the impact of different types of factors with different prediction methods. Taken together, findings of this research confirmed the usefulness of Neural Network and Support Vector Machine as the most competitive classifiers compared with Naïve Bayes and Decision Tree. Furthermore, our findings also indicate that the academic assessment was a prominent factor when predicting students’ graduation time.

Бесплатно

Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD)

Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD)

Fariha Fatima, Saqib Ali, Muhammad Usman Ashraf

Статья научная

In the modern era, the ideas related to software developments are totally replaced the old traditional software development to CBSD. CBSD is the approach that can provide reusability of components to develop new software under minimum chances of risks. Beyond the CBSD features, there are still some significant risks overall the development phase. Generally, the quality of a developed software is depending upon the component integration phase. Nevertheless, component integration phase plays a tremendous role in the success of CBSD that leads to develop new risk free software. The objective of this research was to identify all the risks in CBSD and applied risk reduction activities to mitigate these risks. On the basis of the literature survey, categorized the risks into different categories. For this, an online questionnaire was performed to identify the risks and the risk reduction activities. 85% results point out that CBSD approach is the best approach as compared to the traditional approach. 80% results show that it performs the risk reduction activities, then the quality of the product improves. However, it is a step towards the mitigation of the vulnerabilities and reducing the cost of maintenance.

Бесплатно

Robust Algorithm for Face Detection in Color Images

Robust Algorithm for Face Detection in Color Images

Hlaing Htake Khaung Tin

Статья научная

Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that a face is already located in the given image or the image sequence. Facial features such as eyes, nose and mouth are automatically detected based on properties of the associated image regions. On detecting a mouth, a nose and two eyes, a face verification step based on Eigen face theory is applied to a normalized search space in the image relative to the distance between the eye feature points. The experiments were carried out on test images taken from the internet and various other randomly selected sources. The algorithm has also been tested in practice with a webcam, giving (near) real-time performance and good extraction results.

Бесплатно

Robustness Evaluation for Military Communi-cation Effectiveness based on Multiple Data Sources and Monte Carlo Simulation

Robustness Evaluation for Military Communi-cation Effectiveness based on Multiple Data Sources and Monte Carlo Simulation

Fuli Shi, Chao Li, Yifan Zhu

Статья научная

In the choice process of optimal military commu-nication (MC) alternative, evaluation data mainly come from expert judgments, simulation results and test bed data, and they cannot be directly used in evaluation because of differences in form and attribute; and the MC environment changes rapidly as the operation tempo increasing. It is an important effort to judge the effectiveness robustness of MC alternative, since both the evaluation data and the MC envi-ronment are full of uncertainty. A robustness evaluation method based on multiple data sources and Monte Carlo simluation is proposed with respect to the characteristics of them. Mainly include Belief map as data expression form; Regression relational model built with Support Vector Re-gression (SVR) to acquire simulation data’s confidence with test bed data as training example; Extensive Bayesian Algo-rithm (EBA) to fuse data from multiple sources; Beta distri-bution fitting method for each criterion of each alternative by using the fused results; and calculation of the Probability of Best (PoB) of each alternative through Monte Carlo simu-lation. Take MCE evaluation of a Naval Vessels Fleet as an example, the proposed method is compared with some gen-eral methods. The results indicate that the proposed method helps to obtain relatively conservative alternative and is effective in guaranteeing the robustness.

Бесплатно

Rough Set and Genetic Based Approach for Maximization of Weighted Association Rules

Rough Set and Genetic Based Approach for Maximization of Weighted Association Rules

Shrikant Brajesh Sagar, Akhilesh Tiwari

Статья научная

The present paper proposes a new approach for the effective weighted association rule mining. The proposed approach utilizes the power of Rough Set Theory for obtaining reduct of the targeted dataset. Additionally, approach takes the benefit for weighted measures and the Genetic Algorithm for the generation of the desired set of rules. Enough analysis of proposed approach has been done and observed that the approach works as per the expectation and will be beneficial in situation when there is a requirement for the consideration of hidden rules(maximizing generated rules) in decision-making process.

Бесплатно

Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)

Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)

Enesi F. Aminu, Olaide N. Oyelade, Ibrahim S. Shehu

Статья научная

Social network sites have become de factor in fostering human relationships and business prospects. Several social networks abound with little interoperability functionality that enables exchange of profiles of users. Though, proprietary Application Programming Interfaces (APIs) are provided as endpoints for applications in retrieval of user profile. Moreover, semantic web Friend of a Friend (FOAF) is now been used as a medium for realizing semantic social networks to be able to share user's profile across sites. And since the goal of semantic web is to provide autonomous data centric system coupled on ontology and reasoning, we propose a novel communication protocol named iProc, and usable by autonomous agents that relies on the distributive nature of social network data in coalescing a virtually centralized social network and as well providing means to enlarge user's connectivity to other users across different sites. This paper presents the architecture for a proposed iProc. Furthermore, an implementation of the FOAF files to be used was carried out and discussed.

Бесплатно

Rural Empowerment through Education: Case Study of a Learning Community Telecentre in Indonesia

Rural Empowerment through Education: Case Study of a Learning Community Telecentre in Indonesia

Wichitra Yasya

Статья научная

This research aims to investigate the impact of information and communication technologies (ICTs) for development and social change in a rural telecentre in Indonesia. It attempts to contribute to the literature of ICTs for development and social change, in the field of analysis of a community-driven ICTs initiative and the analysis of an Indonesian telecentre, two research areas that had not been extensively explored. A qualitative case study approach was chosen to reveal the how ICTs are used in community empowerment in the case of Qaryah Thayyibah Learning Community, a school with a telecentre that in founded, run and funded by the community of Kalibening Village in Central Java, Indonesia. Through the application of the stakeholder theory, significant findings related to impact of ICTs for social change of the Qaryah Thayyibah Learning Community were revealed. These findings include patterns of access and participation of stakeholders in relation to ICTs. While ICTs had impacted the students of Qaryah Thayyibah, its impact had not yet been significantly experienced for the wider community outside of the school. Another important finding that emerged from the stakeholder analysis is the influence and value of the local champion in the establishment and sustainability of the ICTs initiative. In conclusion, the findings suggest that education such as that practiced in the Qaryah Thayyibah Learning Community can contribute in achieving rural empowerment, although the process may be long and complex. As this is an exploratory study investigating unquantifiable intangible impacts, further research can focus more on these intangible impacts through different lenses such as culture, power dynamics and social relations.

Бесплатно

SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)

SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)

Somdip Dey

Статья научная

This paper presents a new combined symmetric key cryptographic technique, which is generally an amalgamation of Bit Manipulation, generalized Modified Vernam Cipher, Single Bit Manipulation and Modified Caesar Cipher. The technique proposed here is basically an advanced and upgraded module of SD-AREE cryptographic method, which is based on Modified Caesar Cipher along with Bit Manipulation and the SD-AREE module is very useful in excluding any repetition pattern from a message that is to be encrypted. The proposed method, SD-AREE-I Cipher, is a complete cipher method and unlike its predecessor, SD-AREE, does not need to be added to other cryptographic methods to make those methods stronger. SD-AREE-I method is used to encrypt/decrypt different file formats and the results were very satisfactory. This method is unique and strong because the method contains feedback mechanism and generates new encrypted output every time even with slightest change in the input file (message). The proposed method can also be used for network security.

Бесплатно

Журнал