Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

Students' Understanding of Selected Aspects of Interface Class in Java

Students' Understanding of Selected Aspects of Interface Class in Java

Ilana Lavy, Rami Rashkovits

Статья научная

This study examines the understanding of various aspects relating to the concept of interface class by Management Information Systems students. The examined aspects were: definition, implementation, class hierarchy and polymorphism. The main contributions of this paper are as follows: we developed a questionnaire addressing the above aspects; we classified and analysed the students' responses to determine the students' understanding of the above aspects and to highlight common faulty solutions. The results obtained reveal that majority of the students demonstrated understanding of definition and implementation of interface class, however, only two- thirds of the students demonstrated understanding of interface class in the context of class hierarchy and only one third of them demonstrated understanding of polymorphism in the context of interface class. The students’ utterances from the interviews shed light on their difficulties.

Бесплатно

Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

Ajay Auddy, Sripati Mukhopadhyay

Статья научная

Inthe era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria.One of the biggest challenges that higher education system faces today is to assessthe services provided through Information and Communication Technology(ICT) facilities installed in the campus. This paper studies the responses collected through survey on ICT, in the campusof the University of Burdwan, among the students and research scholarswith the help ofan effective data mining methodology - Variable Consistency Dominance-based Rough Set Approach (VC-DRSA) model to extract meaningful knowledge to improve the quality of managerial decisions in this sphere. It is an extended version of Dominance Rough Set Approach (DRSA) and is applied here to generate a set of recommendations that can help the university to improvise the existing services and augmenting the boundaries of ICT in future development.

Бесплатно

Studies on the Necessity to Integrate the FPGA (Field Programmable Gate Array) Circuits in the Digital Electronics Lab Didactic Activity

Studies on the Necessity to Integrate the FPGA (Field Programmable Gate Array) Circuits in the Digital Electronics Lab Didactic Activity

Corina Daniela Cunţan, Ioan Baciu, Mihaela Osaci

Статья научная

The FPGA (Field Programmable Gate Array) circuits contain programmable logic components and are increasingly popular in implementing the applications for obtaining and processing signals. FPGA represents a modern development trend in digital electronics. The integration in the work with students of this trend is a difficult task, but also useful, because many students face problems when they must use a design environment. The application of FPGA technology can be useful to students either for the laboratory work on advanced topics, or for obtaining skills to use an industry standard design environment. The purpose of this paper is to conduct studies on the need to integrate the FPGA digital electronics trend in the laboratory didactic activity of the students. As case study, we present the design of a control circuit and its implementation in a FPGA, i.e. on a Basys2 board with Xilinx programming environment.

Бесплатно

Study of Blended Learning Process in Education Context

Study of Blended Learning Process in Education Context

Asif Irshad Khan, Noor-ul-Qayyum, Mahaboob Sharief Shaik, Abdullah Maresh Ali, Ch.Vijaya Bebi

Статья научная

Education is one of the areas that are experiencing phenomenal changes as a result of the advancement and use of information technology. Mobile and e-learning are already facilitating the teaching and learning experience with the use of latest channels and technologies. Blended learning is a potential outcome of advanced technology based learning system. The charm of blended learning approach lies in the adaptation of technology aided learning methods in addition to the existing traditional based learning. With the introduction of technology, the overall learning as well as teaching experience is considerably enhanced by covering negative aspects of the traditional approach. In this paper a blended learning model for higher education where traditional classroom lectures are supported via e-learning.

Бесплатно

Study of Recent Charge Pump Circuits in Phase Locked Loop

Study of Recent Charge Pump Circuits in Phase Locked Loop

Umakanta Nanda, Jyotirmayee Sarangi, Prakash Kumar Rout

Статья научная

This paper reviews the design of phase locked loop (PLL) using recently reported charge pump circuits. Lock time, phase noise, lock range and reference spur of each charge pump circuit are investigated. Though improved charge pump circuits are designed recently, their performance is not as effective as the basic charge pump PLL (CP-PLL). Initially the design of PLL using the basic charge pump is completed in this paper and then the PLL using improved charge pumps are redesigned in CMOS 180 nm technology and simulated using Cadence Virtuoso Analog Design Environment. Finally all the charge pumps are compared with respect to the PLL performances. The current starved voltage controlled oscillator (VCO) used for the design of PLL brings about a tuning range of 119.5 MHz to 2.3 GHz. The PLL using different charge pumps produces a lock time which varies from 204 ns to 329 ns. The other parameters like lock range, phase noise and reference spur are also examined.

Бесплатно

Study of Task Scheduling in Cloud Computing Environment Using Soft Computing Algorithms

Study of Task Scheduling in Cloud Computing Environment Using Soft Computing Algorithms

Saurabh Bilgaiyan, Santwana Sagnika, Samaresh Mishra, Madhabananda Das

Статья научная

Cloud computing is a popular computing concept that performs processing of huge volume of data using highly accessible geographically distributed resources that can be accessed by users on the basis of Pay as per Use policy. Requirements of different users may change so the amount of processing involved in such paradigm also changes. Sometimes they need huge data processing. Such highly volumetric processing results in higher computing time and cost which is not a desirable part of a good computing model. So there must be some intelligent distribution of user's work on the available resources which will result in an optimized computing environment. This paper gives a comprehensive survey on such problems and provide a detailed analysis of some best scheduling techniques from the domain of soft computing with their performance in cloud computing.

Бесплатно

Study of performance evaluation of binary search on merge sorted array using different strategies

Study of performance evaluation of binary search on merge sorted array using different strategies

Sherin W. Hijazi, Mohammad Qatawneh

Статья научная

Search algorithm, is an efficient algorithm, which performs an important task that locates specific data among a collection of data. Often, the difference among search algorithms is the speed, and the key is to use the appropriate algorithm for the data set. Binary search is the best and fastest search algorithm that works on the principle of ‘divide and conquer’. However, it needs the data collection to be in sorted form, to work properly. In this paper, we study the efficiency of binary search, in terms of execution time and speed up, by evaluating the performance improvement of the combined search algorithms, which are sorted into three different strategies: sequential, multithread, and parallel using message passing interface. The experimental code is written in ‘C language’ and applied on an IMAN1 supercomputer system. The experimental results show that the decision variables are generated from the IMAN1 supercomputer system, which is the most efficient. It varied for the three different strategies, which applies binary search algorithm on merge sort. The improvement in performance evaluation gained by using parallel code, greatly depends on the size of data set used, and the number of processors that the speed-up of the parallel codes on 2, 4, 8, 16, 32, 64, 128, and 143 processors is best executed, using between a 50,000 and 500,000 dataset size, respectively. Moreover, on a large number of processors, parallel code achieves the best speed-up to a maximum of 2.72.

Бесплатно

Study on Challenges, Opportunities and Predictions in Cloud Computing

Study on Challenges, Opportunities and Predictions in Cloud Computing

Jitendra Singh

Статья научная

Cloud computing is transforming the way IT is owned and utilized in the present day business scenario. Several predictions by the researchers and analytical enterprises have predicted unprecedented growth for this emerging paradigm. This work is an attempt to analyze the cloud future based on the various reports and predictions published recently. We have explored the various opportunities that will drive the cloud growth. We have also highlighted the effect of cloud in Indian and US market. Significance of the study is validated by conducting the Strength, weakness, opportunity, and Threat (SWOT) analysis. Based on the findings, we have identified the intensity of challenges faced by the various types of cloud deployment model. Correspondingly, we have recommended the critical challenges that need to be addressed first, in order to facilitate the cloud in gaining further momentum.

Бесплатно

Study on Extenics Information Fusion Method and It’s Application

Study on Extenics Information Fusion Method and It’s Application

Li Zhong, Wang Ailing, Qi Furong

Статья научная

This paper makes analysis on theories of D-S evidential reasoning, rough sets, and extenic sets; and indicates that there are some similarities among the three theories in defining uncertainty sets. Therefore, it’s feasible to introduce relevant theories and methods of extenics into information fusion and a method of extenics fusion (MEF) is presented as well. The method combines extenic correlation function with Dempster rule and is considered a good solution for problems of evidence collision and BPA function in information fusion method based on D-S evidential reasoning. The simulation test shows that MEF is better than the traditional D-S evidential reasoning and is applicable to assess all kinds of problems. Using the method of this paper to evaluate surface water in one area of Northern China, the results were consistent with the fact.

Бесплатно

Study on Overburden's Destructive Rules Based on Similar Material Simulation

Study on Overburden's Destructive Rules Based on Similar Material Simulation

Ruyu Zheng, Kan Wu, Ru Li

Статья научная

Analysis on the current research status, this article studies on the dynamic subsidence principles of overburden rock strata during coal mining based on similar material simulation test. Close ranged industrial photogram metric system was introduced to collect data. After coordinate transformation, matching and model amendment, dynamic subsidence curves which can be used to analyze the continuity characteristics of overburden subsidence, changes of boundary angle and displacement angle, volume transferring law from rock to surface, etc. were got. The result is useful in further study of the dynamic rule of overburden strata and enriches mining subsidence principles.

Бесплатно

Suitability and Contribution of Agile Methods in Mobile Software Development

Suitability and Contribution of Agile Methods in Mobile Software Development

Asra Khalid, Sobia Zahra, Muhammad Fahad Khan

Статья научная

Boom of mobile app market is phenomenal and so are the challenges for developing these mobile applications. With changing mobile market technology and trends, various technical constraints for building these mobile apps also cropped up with time. Tradition development approaches are unable to tackle these challenges and technical limitations of mobile market. Analyzing this situation researchers have proposed numerous agile practices to develop people oriented mobile app which embrace their changing needs. This paper provides a brief overview of some effective and commonly used agile approaches that adds value to mobile software business. Suitability of these approaches to fit mobile needs is also discussed in this paper. It is suggested that agile innovations offer a solution for mobile applications and examine developer who are in quest of building high quality products.

Бесплатно

Support Vector Machine as Feature Selection Method in Classifier Ensembles

Support Vector Machine as Feature Selection Method in Classifier Ensembles

Jasmina Đ. Novakovic

Статья научная

In this paper, we suggest classifier ensembles that can incorporate Support Vector Machine (SVM) as feature selection method into classifier ensembles models. Consequences of choosing different number of features are monitored. Also, the goal of this research is to present and compare different algorithmic approaches for constructing and evaluating systems that learn from experience to make the decisions and predictions and minimize the expected number or proportion of mistakes. Experimental results demonstrate the effectiveness of selecting features with SVM in various types of classifier ensembles.

Бесплатно

Surface Electromyography Signal Acquisition and Classification Using Artificial Neural Networks (ANN)

Surface Electromyography Signal Acquisition and Classification Using Artificial Neural Networks (ANN)

R.M.P.K. Rasnayake, M.W.P. Maduranga, J.P.D.M. Sithara

Статья научная

An electromyography (EMG) is an analytical tool used to record muscles' electrical activity, which produces an electrical signal proportional to the level of muscle activity. EMG signal plays a vital role in bio-mechatronic engineering for designing intelligent prostheses and other rehabilitation devices. Analysis of EMG signals with powerful and advanced methodologies is an essential requirement in EMG signal processing, as the EMG signal is a complex nonlinear, non-stationary signal in nature. It is required to use advanced signal processing techniques rather than conventional methods to exact EMG signals' features. Fourier transforms (FT) are not the most appropriate tool for analyzing non-stationary signals such as EMG. In this work, we have developed a system that can be useful for disabled persons to get a regular lifestyle using a functioning part of the body. Here, we studied the electrocution gram behavior of human body parts to feature extraction and trained the neural network to simulate the movements of mechanical actuators such as robotic arms. The wavelet transformation has been used to get high-quality feature extraction from electro cardio grapy and develops proper faltering methods for cardio systems' electrical signals. Finally, an artificial neural network (ANN) is used to classify the EMG signals through exacted features. Classification results are presented in this paper.

Бесплатно

Survey on Adverse Effect of Sophisticated Integrated Development Environments on Beginning Programmers' Skillfulness

Survey on Adverse Effect of Sophisticated Integrated Development Environments on Beginning Programmers' Skillfulness

Alaba T. Owoseni, S. A. Akanji

Статья научная

Integrated development environment as a software system that aids programmers in developing software applications quickly and effectively has been perceived to also serve as an inappropriate tool for beginning programmers when it is specially developed with some complex features. This complexity in features as perceived leaves the programmers with a double role of studying complexity found in the environment and the semantics with syntaxes of the concerned programming language. This paper categorizes few of the available integrated development environments based on program building tools that are integrated in them and also considers an experimental survey on their adverse effects on novice programmers by sampling programmers' opinions using closed ended questionnaires. The population was randomly selected from some tertiary institutions in Nigeria. The opinions were statistically analyzed using chi square and based on the analysis, beginning programmers learning strengths are found greatly influenced by the type of integrated development environment used.

Бесплатно

Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm

Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm

Sherin Zafar, M K Soni

Статья научная

The paper comprehends an impending accost of intensifying biometric stationed authentication protocol(BSAP) bestowing meta-heuristic genetic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET. Biometrics are more advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using genetic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our protocol is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and make the network more secure.

Бесплатно

System Design of Supply Chain Management and Thai Food Export to Global Market via Electronic Marketing

System Design of Supply Chain Management and Thai Food Export to Global Market via Electronic Marketing

Thitirath Cheowsuwan, Sudarat Arthan, Supan Tongphet

Статья научная

This paper presents the electronic marketing application for users involved with the food industry in Thailand. The purpose of this research is to study and develop the supply chain management and the Thai food export to global market. Moreover, this project will improve the knowledge entrepreneurship in this industry to export the food products to the world market through the electronic marketing system. This research will be focused in the two provinces of Thailand that are Phrae and Phayao. The sample group of this research includes the food export manufacturers, the raw material suppliers, and the family business trainees. The research methodology exploits the system development process with the cycle of information system development. The process will develop all fundamentals of the system in every part, which are analysis, design, development, installation, performance testing, and user’s application training. According to the study, the sample users demand the chain management system to produce and export their products. The reason is that they need a tool to assist all sectors of stakeholders; upstream, midstream and downstream. As the results, the proposed system provides functionality that covers the needs of all stakeholders, which are the raw material suppliers, the customers (franchise and restaurant), and the managers (manufacturing, procurement, inventory, restaurant, and sales). From the system's efficiency evaluation by our sample group, the proposed system has been given a satisfied result of system performance from all users: the food export manufacturers (good: = 3.64), the raw material suppliers (good: = 3.63), and the family business trainees (good: = 3.63).

Бесплатно

Task-based Approach in College English Teaching of Digital-based Context

Task-based Approach in College English Teaching of Digital-based Context

Ling Jiang, Kai Sun

Статья научная

With the wide employment of modern educational technology, college English teaching is going on a process of replacing traditional educational media with modern ones, which are closely connected with multimedia computers and internet technology to raise its efficiency and quality. However, some problems and challenges still exist in the college English teaching. In order to solve the problems, this article designs a test and collects data to check the effectiveness of the task-based approach within the Internet-assisted multimedia in college English teaching. The results show that Linguistic form was analyzed and practiced with task-based approach which may help the learners notice the linguistic problems and try out new language forms and structures, and that Internet-assisted multimedia has been effective in intriguing learners' interests and greatly enhanced their self-esteem.

Бесплатно

Taxonomy learning from health care social communities to improve EHR implementation

Taxonomy learning from health care social communities to improve EHR implementation

Zahia Marouf, Sidi Mohamed Benslimane

Статья научная

In this paper, we propose an approach to extract ontological structures from datasets generated by health care users of social networking sites. The objective of this approach is to exploit the user generated implicit semantics as a complement to more formalized knowledge representations. We aim for this latter to leverage the adoption level of the Electronic Health Record systems that are complaining from the shortage in standards and controlled vocabularies.

Бесплатно

Teachers’ Use of Technology and Constructivism

Teachers’ Use of Technology and Constructivism

Abbas Pourhosein Gilakjani, Lai-Mei Leong, Hairul Nizam Ismail

Статья научная

Technology has changed the way we teach and the way we learn. Many learning theories can be used to apply and integrate this technology more effectively. There is a close relationship between technology and constructivism, the implementation of each one benefiting the other. Constructivism states that learning takes place in contexts, while technology refers to the designs and environments that engage learners. Recent efforts to integrate technology in the classroom have been within the context of a constructivist framework. The purpose of this paper is to examine the definition of constructivism, incorporating technology into the classroom, successful technology integration into the classroom, factors contributing to teachers’ use of technology, role of technology in a constructivist classroom, teacher’s use of learning theories to enable more effective use of technology, learning with technology: constructivist perspective, and constructivism as a framework for educational technology. This paper explains whether technology by itself can make the education process more effective or if technology needs an appropriate instructional theory to indicate its positive effect on the learner.

Бесплатно

Teaching Cyber Security Course in the Classrooms of NMIMS University

Teaching Cyber Security Course in the Classrooms of NMIMS University

Prathamesh Churi, N. T. Rao

Статья научная

The paper aims at implementing new pedagogy and assessment practices from rigorous literature survey perusing quality papers and articles. The appropriate pedagogy and relevant assessment always go hand in hand. One cannot achieve effective teaching by compromising the other component. In engineering, pedagogy and assessment play extremely important roles. In recent years, engineering education has lost track of the big picture of what the curriculum has to be. In Computer Science Engineering, the course contents often change according to the demands for new technology in the market. Adhering to this fact, the courses must be designed either practical-based or case study based. Rote teaching-learning methods are not as effective as far as the curriculum design in the computing field is concerned. Cyber Security is one such course where students are expected to learn how to create a protective environment for computing and computing resources. The course must be designed in such a way that, students must learn how to identify the vulnerabilities in computing resources and methodologies to mitigate them. This course aims such that students must learn some popular attacks which help them to identify what are the possible ways from where the attacks could happen. The paper makes use of strategic assessment tools for the Cyber Security course (Taught to post-graduation students) and discusses outcomes through course outcome attainment analysis as per the threshold value of attainment set by the Computer Engineering Department to adhere to the accreditation standards. Through course attainment analysis it is observed that, Viva voce assessment tool is not suitable for evaluation of the course as it does not impose the technical details and working of Cyber Security concepts. The overall attainment was 55.55% which is 15% less than the threshold set by Computer Engineering Department.

Бесплатно

Журнал