Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

Two-Level Alloyed Branch Predictor based on Genetic Algorithm for Deep Pipelining Processors

Two-Level Alloyed Branch Predictor based on Genetic Algorithm for Deep Pipelining Processors

Shivam Goyal, Jaskirat Singh

Статья научная

To gain improved performance in multiple issue superscalar processors, the increment in instruction fetch and issue rate is pretty necessary. Evasion of control hazard is a primary source to get peak instruction level parallelism in superscalar processors. Conditional branch prediction can help in improving the performance of processors only when these predictors are equipped with algorithms to give higher accuracy. The Increment in single miss-prediction rate can cause wastage of more than 20% of the instructions cycles, which leads us to an exploration of new techniques and algorithms that increase the accuracy of branch prediction. Alloying is a way to exploit the local and global history of different predictors in the same structure and sometimes also called hybrid branch prediction. In this paper, we aim to design a more accurate and robust two-level alloyed predictor, whose behavior is more dynamic on changing branch direction.

Бесплатно

Two-dimensional mathematical models of visco-elastic deformation using a fractional differentiation apparatus

Two-dimensional mathematical models of visco-elastic deformation using a fractional differentiation apparatus

Yaroslav Sokolovskyy, Maryana Levkovych

Статья научная

In this paper, using fractional differential and integral operators, constructed are two-dimensional mathematical models of viscoelastic deformation, which are characterized by memory effects, spatial non-locality, and self-organization. The fractal rheological models by Maxwell, Kelvin and Voigt, their structural properties and the influence of the fractional integro-differential operator on the process of viscoelasticity are investigated. Using the Laplace transform method and taking into account the properties of the fractional differential apparatus, analytical relations are obtained in the integral form for describing the stresses of generalized two-dimensional fractional-differential rheological models by Maxwell, Kelvin, and Voigt. Since the fractional-differential parameters of fractal models allow describing deformation-relaxation processes more perfectly than traditional methods, algorithmic aspects of identification of structural and fractal parameters of models are presented in the work. Explicit expressions have been obtained to describe the deformation process for one-dimensional fractional-differential models by Voigt, Kelvin, and Maxwell. The results of identification of structural and fractal parameters of the Maxwell and Voigt models are presented. The estimates of the accuracy of the obtained identification results were found using the statistical criterion based on the correlation coefficient. The influence of fractional-differential parameters on deformation-relaxation processes is investigated.

Бесплатно

Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem With Bit-level Encryption Algorithm

Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem With Bit-level Encryption Algorithm

Satyaki Roy, Navajit Maitra, Shalabh Agarwal, Joyshree Nath, Asoke Nath

Статья научная

In the present paper a new cryptographic method called UES Version-III has been introduced. Nath et al recently developed few efficient encryption methods such as UES version-I, Modified UES-I, UES version-II, TTJSA, DJMNA Nath et. al showed that TTJSA and DJMNA is most suitable methods to encrypt password or any small message. The name of the present method is Ultra Encryption Standard Version-III. It is a Symmetric key Cryptosystem which includes multiple encryption, bit-wise randomization, new advanced bit-wise encryption technique with feedback. In this paper, the authors have performed encryption entirely at the bit-level to achieve greater strength of encryption. In the result section the authors have shown the spectral analysis of encrypted text as well as plain text. The spectral analysis shows that UES-III is free from standard cryptography attack such as brute force attack, known plain text attack and differential attack.

Бесплатно

Ultra Encryption Standard Modified (UES) Version-I: Symmetric Key Cryptosystem with Multiple Encryption and Randomized Vernam Key Using Generalized Modified Vernam Cipher Method, Permutation Method, and Columnar Transposition Method

Ultra Encryption Standard Modified (UES) Version-I: Symmetric Key Cryptosystem with Multiple Encryption and Randomized Vernam Key Using Generalized Modified Vernam Cipher Method, Permutation Method, and Columnar Transposition Method

Satyaki Roy, Navajit Maitra, Shalabh Agarwal, Joyshree Nath, Asoke Nath

Статья научная

In the present paper a new combined cryptographic method called Modified UES Version-I has been introduced. Nath et al. have already developed several symmetric key methods. It combines three different methods namely, Generalized Modified Vernam Cipher method, Permutation method and Columnar Transposition method. Nath et al recently developed few efficient combined encryption methods such as TTJSA, DJMNA where they have used generalized MSA method, NJJSAA method and DJSA methods. Each of the methods can be applied independently to encrypt any message. Nath et. al showed that TTJSA and DJMNA is most suitable methods to encrypt password or any small message. The name of this method is Ultra Encryption Standard modified (UES) version-I since it is based on UES version-I developed by Roy et. al. In this method an encryption key pad in Vernam Cipher Method also the feedback has been used which is considered to make the encryption process stronger. Modified UES Version-I may be applied to encrypt data in any office, corporate sectors etc. The method is most suitable to encrypt any type of file such as text, audio, video, image and databases etc.

Бесплатно

Undergraduate Program in Network Engineering and Security – A Feasibility Study

Undergraduate Program in Network Engineering and Security – A Feasibility Study

Fahed Awad, Omar Banimelhem, Eyad Taqieddin, Raed Bani-Hani

Статья научная

In this article, a feasibility study for initiating a new undergraduate program in network engineering and security is presented. The study was based on surveying and analyzing the current and projected future market demand for specialized network engineering graduates. The results of the study concluded that the demand for such a specialty in the work place is rapidly growing as the networking and telecommunication technologies are becoming essential and integral parts of about any organization around the world. As a result of the study, a pioneering program of network engineering and security was established at the Jordan University of Science and Technology.

Бесплатно

Understandings of Graduate Students on Nature of Science

Understandings of Graduate Students on Nature of Science

Mustafa Serdar Koksal, Canan Tunc Sahin

Статья научная

Knowing about nature of science (NOS) and its products is a basic requirement of all graduate students and researchers due to being both members of society and experts on different scientific disciplines. As the first step, determining NOS understandings of graduate students has importance to go further in developing current situation. Therefore, this study aimed to determine NOS understandings of graduate students from different disciplines. The study included seven graduate students who were enrolled in universities as researchers. As the data collection way, face-to-face interview was utilized. The data of the study was analyzed by assigning the participants to four categories; expert, naive, mixed and not applicable. The results showed that majority of the participants were expert on social and cultural embeddedness of science and role of creativity and imagination in science while majority of the participants were naive on the aspects of “hierarchy between theories and laws”. Majority of them had mixed understandings on the aspects of existence of only one method in science, subjectivity, tentativeness. Interestingly, all of the participants were naive in terms of definition of science. The results and implications of the study will be discussed..

Бесплатно

Use of Intelligent Agents in Collaborative M-Learning: Case of Facilitating Group Learner Interactions

Use of Intelligent Agents in Collaborative M-Learning: Case of Facilitating Group Learner Interactions

Stephen T. Njenga, Robert O. Oboko, Elijah I. Omwenga, Elizaphan M. Maina

Статья научная

Intelligent agents have been used in collaborative learning. However, they are rarely used to facilitate group interactions in collaborative m-learning environments. In view of this, the paper discusses the use of intelligent agents in facilitating collaborative learning in mobile learning environments. The paper demonstrates how to design intelligent agents and integrate them in collaborative mobile learning environments to allow group learners to improve their levels of group knowledge construction. The design was implemented in a collaborative mobile learning system running on Modular Object-Oriented Dynamic Learning Environment (Moodle) platform. The application was used in some experiments to investigate the effects of those facilitated interactions on the level of group knowledge construction. The results showed improved levels of group knowledge construction in instances where the facilitations were enabled compared to where they were disabled. The paper concludes that the use of intelligent agents in facilitating learner group interactions in collaborative mobile learning environments improves the levels of group knowledge construction. For future work, the use of intelligent agents can be tested in other areas of group interactions to enhance group learning.

Бесплатно

Using Components of Corpus Linguistics and Annotation Tools in Sign Language Teaching

Using Components of Corpus Linguistics and Annotation Tools in Sign Language Teaching

Katarzyna Barczewska, Jakub Gałka, Dorota Szulc, Mariusz Mąsior, Rafał Samborski, Tomasz J. Wilczyński

Статья научная

As an interdisciplinary group of people working on automatic sign language recognition, authors of the article developed concept how to facilitate the process of understanding Sign Language (SL) utterances by hearing learners. Concept is based on Polish SL, and was created in response to signals from the students who indicate understanding of SL messages as the hardest part of learning process, but can be easily adapted to other SLs. In comparison to speech corpora, SL databases constitute only a small fraction. From the other side thanks to the Internet there are available video recordings with native-signers, as well as tools which enable their analysis. Developed concept is based on using one of the available annotation tools used by professionals all over the world to describe SL corpora in SL classes. Making annotations helps students in understanding foreign language, corpora analysis helps to find objective rules governing SL, computer assisted language learning can be attractive way of study and Internet – great source of materials.

Бесплатно

Using Computer Aided Assessment System to Assess College Students Writing Skill

Using Computer Aided Assessment System to Assess College Students Writing Skill

Huihua He, Jin Liu, Hongmin Ren

Статья научная

College students are facing challenges to present their ideas by writing a paper because they rely more on information from computer and web. The purpose of this paper is to present a novel computer aided assessment system, to assess college students’ writing ability. The CAAS system comprises of an expert team, a set of achievement standard for assessment, and software systems to conduct data analysis and store related information. It has been used by institute in U.S. It yields face validity and consistency reliability. Objective evaluation results will be provided by randomly-assigned multiple reviewers. CAAS can assist college students improve writing skills, can describ a brief picture and detailed information for both school administrators and policy makers as well.

Бесплатно

Using Extra Credit to Facilitate Extra Learning in Students

Using Extra Credit to Facilitate Extra Learning in Students

Mohammad Muztaba Fuad, Elva J. Jones

Статья научная

Giving students extra credit work is a hotly debated pedagogical issue. This paper shares experience of using extra credit quizzes to push students to think critically and beyond the boundaries. This particular type of quizzes are not announced before and presented to students as a surprise quiz. A certain percentage of the grade earned in these quizzes was included in student's final grade calculations. With a well-developed model of questions, quiz structure and grade calculation, the presented model of extra credit eliminates negativity related to extra credit work and also motivates students into course work. Our findings showed that by relieving students from the mental pressure of testtaking andby making those tests/quizzes as extra credit; students actually performs better in solving harder problems and eventually learns more of the advanced course topics.

Бесплатно

Using FAHP in the educational and vocational guidance

Using FAHP in the educational and vocational guidance

Essaid EL Haji, Abdellah Azmani, Mohamed El Harzli

Статья научная

This paper presents the use of the FAHPmethod (Fuzzy Analytic Hierarchy Process) to help young people choose the most appropriate activity sectors for their profile. This choice is based on three criteria: Professional interests, professional sub-interests and personality traits. This work is a part of a global context aiming to apply the Multi-criteria Decision-Making (MCDM) methods in the vocational guidance according to the process schematized in Figure 3.

Бесплатно

Using Unified Theory of Acceptance and Use of Technology Model to Predict Students' Behavioral Intention to Adopt and Use E-Counseling in Ghana

Using Unified Theory of Acceptance and Use of Technology Model to Predict Students' Behavioral Intention to Adopt and Use E-Counseling in Ghana

Emmanuel Awuni Kolog, Erkki Sutinen, Marjatta Vanhalakka-Ruoho, Jarkko Suhonen, Ebenezer Anohah

Статья научная

The urge to progressively motivate e-counselling in schools is somewhat dependent on students’ behavioural intention towards the use of counselling technologies. This paper presents an empirical approach of using Unified Theory of Acceptance and Use of Technology model to ascertain students’ behavioural intention to adopt and use e-counselling in Ghana. Questionnaires were used to collect data from two hundred and fifty (N=250) randomly selected students from Ghana. Cronbach alpha (α) was first employed to validate and ascertain the reliability of the data. Subsequently, Multiple Linear Regression (MLR) was employed in analysing the data. After that, a follow-up interview was conducted to explore the variance in our findings from the collected data through the questionnaires. In the end, the reliability of the test items contained in the questionnaire yielded strongly at 87.6%. Also, whereas the outcome of the research suggests Performance Expectancy and Social Influence as the influencing constructs (factors) towards students’ behavioural intention to adopt and use e-counselling, Facilitation Condition and Effort Expectancy had no effect on the behavioural intention of students to adopt and use e-counselling in Ghana. The findings shall be considered in developing e-counselling system for counselling delivery.

Бесплатно

Using Virtual Security Lab in Teaching Cryptography

Using Virtual Security Lab in Teaching Cryptography

Salma M. Gaffer, Daniyal M. Alghazzawi

Статья научная

Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to measure the performance of the students’ outcomes in the lab comparing with other students from a previous semester. The result of the survey shows a significant feedback on the system.

Бесплатно

Using Wavelet-Based Contourlet Transform Illumination Normalization for Face Recognition

Using Wavelet-Based Contourlet Transform Illumination Normalization for Face Recognition

Long B. Tran, Thai H. Le

Статья научная

Evidently, the results of a face recognition system can be influenced by image illumination conditions. Regarding this, the authors proposed a system using wavelet-based contourlet transform normalization as an efficient method to enhance the lighting conditions of a face image. Particularly, this method can sharpen a face image and enhance its contrast simultaneously in the frequency domain to facilitate the recognition. The achieved results in face recognition tasks experimentally performed on Yale Face Database B have demonstrated that face recognition system with wavelet-based contourlet transform can perform better than any other systems using histogram equalization for its efficiency under varying illumination conditions.

Бесплатно

Utilization of Data Mining Techniques for Prediction and Diagnosis of Tuberculosis Disease Survivability

Utilization of Data Mining Techniques for Prediction and Diagnosis of Tuberculosis Disease Survivability

K.R.Lakshmi, M.Veera Krishna, S.Prem Kumar

Статья научная

The prediction and diagnosis of Tuberculosis survivability has been a challenging research problem for many researchers. Since the early dates of the related research, much advancement has been recorded in several related fields. For instance, thanks to innovative biomedical technologies, better explanatory prognostic factors are being measured and recorded; thanks to low cost computer hardware and software technologies, high volume better quality data is being collected and stored automatically; and finally thanks to better analytical methods, those voluminous data is being processed effectively and efficiently. Tuberculosis is one of the leading diseases for all people in developed countries including India. It is the most common cause of death in human being. The high incidence of Tuberculosis in all people has increased significantly in the last years. In this paper we have discussed various data mining approaches that have been utilized for Tuberculosis diagnosis and prognosis. This study paper summarizes various review and technical articles on Tuberculosis diagnosis and prognosis also we focus on current research being carried out using the data mining techniques to enhance the Tuberculosis diagnosis and prognosis. Here, we took advantage of those available technological advancements to develop the best prediction model for Tuberculosis survivability.

Бесплатно

Various Types of Image Noise and De-noising Algorithm

Various Types of Image Noise and De-noising Algorithm

Gourav, Tejpal Sharma

Статья научная

Image de-noising is a procedure that used to upgrade the picture quality after corrupted by the noise. There are a few techniques have been proposed for picture de-noising. Noise lessening and reclamation of image is relied upon to enhance the subjective review of a picture and the execution criteria of quantitative picture examination systems Digital picture is slanted to an assortment of commotion which influences the nature of picture. The criteria of the commotion expulsion issue rely on upon the noise sort by which the picture is defiling. To diminish the image commotion a few sorts of direct and non strategies separating methods and de-noising calculation have been proposed. Straight channels are not ready to successfully take out motivation commotion as they tend to obscure the edges of a picture. Then again non straight channels are suited for managing drive commotion. Diverse methodologies for decrease of commotion and image upgrade have been viewed as, each of which has their own restriction and favorable circumstances.

Бесплатно

Vector Image Retrieval Methods Based on Fuzzy Patterns

Vector Image Retrieval Methods Based on Fuzzy Patterns

Yevgeniya Sulema, Etienne Kerre, Oksana Shkurat

Статья научная

In this work we present two methods of vector graphic objects retrieval based on a fuzzy description of their shapes. Both methods enable the retrieval of vector images resembling to a given fuzzy pattern. The basic method offers a geometrical interpretation of a fuzziness measure as a radius of a circle with the center in each vertex of a given candidate object. It enables the representation of uncertain information about a pattern object defined by its “fuzzy” vertices. The advanced method generalizes this approach by considering an ellipse instead of a circle. The basic method can be used for the comparison of polygons and other primitives in vector images. The advanced method can be used for complex shapes retrieval. To enable saving a “fuzzy” image as a file, the modification of the SVG format with a new attribute “fuzziness” is proposed for both methods. The advanced method practical implementation is illustrated by the retrieval of medical images, namely, heart computer tomography images.

Бесплатно

Virtual Examination Supervision System for Nigerian Universities

Virtual Examination Supervision System for Nigerian Universities

Akazue Maureen I., Ajenaghughrure Ighoyota Ben.

Статья научная

Examination malpractice is a dishonest conduct by a candidate prior to examination and through the examination to attain success effortlessly. Examination malpractice is a plague that heralds severe menace for the nation and has constantly remained a bother in the Nigerian educational system. Supervising examination has been manual since the inception of examinations in Delta State University. Likewise, most of the State Universities and Federal Universities in Nigeria utilize manual supervision of examination though visit by examination supervisors. Thus, this research paper presents a virtual examination supervision system (VESS) that checks candidates who are writing examination. VESS is an information technology approach towards curbing the problem of cheating in examination hall, using computer vision motion detection technique on real-time IP-camera video stream from examination. The implementation and practical experiment of VESS was carried out in Delta State University and result analysis indicated shift in position by examinees during examination at every milliseconds, which is difficult for human eye to monitor accurately and other cases such as copying and impersonation. These further proved that VESS is a solution to mitigating examination malpractice of all kinds and protection of the invigilators. Furthermore, the stored result in VESS can be used as evidence to punish the culprit.

Бесплатно

Visual Association Analytics Approach to Predictive Modelling of Students’ Academic Performance

Visual Association Analytics Approach to Predictive Modelling of Students’ Academic Performance

Udoinyang G. Inyang, Imo J. Eyoh, Samuel A. Robinson, Edward N. Udo

Статья научная

Persistent and quality graduation rates of students are increasingly important indicators of progressive and effective educational institutions. Timely analysis of students’ data to guide instructors in the provision of academic interventions to students who are at risk of performing poorly in their courses or dropout is vital for academic achievement. In addition there is need for performance attributes relationship mining for the generation of comprehensible patterns. However, there is dearth in pieces of knowledge relating to predicting students’ performance from patterns. This therefore paper adopts hierarchical cluster analysis (HCA) to analyze students’ performance dataset for the discovery of optimal number of fail courses clusters and partitioning of the courses into groups, and association rule mining for the extraction of interesting course-status association. Agglomerative HCA with Ward’s linkage method produced the best clustering structure (five clusters) with a coefficient of 92% and silhouette width 0.57. Apriori algorithm with support (0.5%), confidence (80%) and lift (1) thresholds were used in the extraction of rules with student’s status as consequent. Out of the twenty one courses offered by students in the first year, seven courses frequently occur together as failed courses, and their impact on the respective students’ performance status were assessed in the rules. It is conjectured that early intervention by the instructors and management of educational activities on these seven courses will increase the students’ learning outcomes leading to increased graduation rate at minimum course duration, which is the overarching objective of higher educational institutions. As further work, the integration of other machine learning and nature inspired tools for the adaptive learning and optimization of rules respectively would be performed.

Бесплатно

Visual Block-based Programming for ICT Training of Prospective Teachers in Morocco

Visual Block-based Programming for ICT Training of Prospective Teachers in Morocco

Ibrahim Ouahbi, Hassane Darhmaoui, Fatiha Kaddari

Статья научная

We conducted a training experimentation on computer coding whose aim is to probe ICT skills enhancement of pre-service teachers in Morocco. For that, we have developed and implemented training sessions using a visual programming tool (Scratch) targeting 63 prospective teachers at the Faculty of Educational Sciences (FSE) and the Regional Center for Education and Training Professions (CRMEF) in Nador, Morocco. During these sessions, trainees were introduced to algorithmic thinking where they implemented teaching sequences in their specialty subjects using Scratch. Pre and post surveys were conducted to measure the evolution of the trainees’ perceptions towards the integration of computer coding in the teaching and learning of their specialties. The analysis of the surveys showed the potential of integrating computer coding in the development of learners’ transversal skills. The training revealed different possibilities of exploiting visual block-based programming environments in the teaching and learning process.

Бесплатно

Журнал