Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 968

Adoption of Employment-oriented Experience Training Program to Improve Undergraduates Employment Competence

Adoption of Employment-oriented Experience Training Program to Improve Undergraduates Employment Competence

Shuang Liu, Peng Chen

Статья научная

To enhance undergraduates employment competitive advantages, communication and expression capability and team cooperation ability in engineering practice experiences, an experience training program is adopted to cultivate compound international talents of software development required by software companies. For the training program, knowledge spans and integration extent of teaching contents, implementation flow and flexible evaluation methods are also illustrated in detail. Especially during practical training project selected from software companies, students are guided to cooperate with team members to complete regular software development, which will improve their employment competence and make them fit for their future work more rapidly. With auxiliary experience training online teaching platform, three times of training program has been carried out successfully and a statistics table shows effects of the training program.

Бесплатно

Adoption of Innovative Education Strategies to the Needs of the Time: A Case Study of Ritsumeikan Asia Pacific University (APU)

Adoption of Innovative Education Strategies to the Needs of the Time: A Case Study of Ritsumeikan Asia Pacific University (APU)

PISHVA Davar

Статья научная

In our modern era of Internet, mobile and digital information technology, adoption of innovative education strategies to the needs of the time is quite important particularly at private educational institutions which cater to economically affluent students who are becoming picky and often more interested in their distractions than in their studies. Ritsumeikan Asia Pacific University (APU) which was established in the year 2000 with an aim of becoming a hub for shaping the future of Asia-Pacific region by creating world class leaders in science, management, and economics through a bilingual curriculum, international under-standing, promotion of freedom, peace, humanity, and sensitiveness to the needs of the time, has integrated multimodal approach towards enhancing the quality of teaching and learning, and provides a total student support and care system. As a millennium university, it is equipped with state-of-the-art classrooms and tries to enhance its educational endeavors through proper use and efficient adaptation of educational technologies into its teaching pedagogies. However, due to being a private university and charging handsome tuitions fees, it has been attracting some of the most affluent students onto the campus, many of whom are often more interested in their distractions than in their studies. The decline in youth population and the economic slowdown in Japan have also adversely affected the quality of incoming students. This paper attempts to explain how APU tries to assure quality of their graduates despite the abovementioned problems through blended learning, peer knowledge sharing, adaptation of Blackboard (Bb, the most commonly implemented Web-based learning management system), portfolio, active learning, student support, academic advising, and by providing of a natural learning environment.

Бесплатно

Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm

Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm

Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath

Статья научная

Due to tremendous growth in communication technology, now it is a real problem / challenge to send some confidential data / information through communication network. For this reason, Nath et al. developed several information security systems, combining cryptography and steganography together, and the present method, ASA_QR, is also one of them. In the present paper, the authors present a new steganography algorithm to hide any small encrypted secret message inside QR CodeTM , which is then randomized and then, finally embed that randomized QR Code inside some common image. Quick Response Codes (or QR Codes) are a type of two-dimensional matrix barcodes used for encoding information. It has become very popular recently for its high storage capacity. The present method is ASA_QR is a combination of strong encryption algorithm and data hiding in two stages to make the entire process extremely hard to break. Here, the secret message is encrypted first and hide it in a QR CodeTM and then again that QR CodeTM is embed in a cover file (picture file) in random manner, using the standard method of steganography. In this way the data, which is secured, is almost impossible to be retrieved without knowing the cryptography key, steganography password and the exact unhide method. For encrypting data The authors used a method developed by Nath et al i.e. TTJSA, which is based on generalized modified Vernam Cipher, MSA and NJJSA method; and from the cryptanalysis it is seen that TTJSA is free from any standard cryptographic attacks, like differential attack, plain-text attack or any brute force attack. After encrypting the data using TTJSA,the authors have used standard steganographic method To hide data inside some host file. The present method may be used for sharing secret key, password, digital signature etc.

Бесплатно

Advances in Mechanics and Outlook for Future Mankind Progress

Advances in Mechanics and Outlook for Future Mankind Progress

Joseph J. Smulsky

Статья научная

Three problems for the interaction between N bodies to which exact solutions were obtained are discussed. In the first problem, the bodies are located axisymmetrically in a plane. Possible trajectories of the bodies here are ellipses, parabolas, hyperbolas, or straight lines. Results of solving this problem are further used for solving problems about Earth's rotation and Mercury's perihelion. In the second problem, the body system consists of several layers, and it rotates as an entity. In the third problem, the bodies are uniformly distributed over a sphere, and they move experiencing no mutual collisions. The latter problem allows the formation of several planets, for instance, one hundred planets resembling the Earth and moving under identical conditions with respect to the Sun. The latter possibility opens a way toward unrestricted mankind progress.

Бесплатно

Age Dependent Face Recognition using Eigenface

Age Dependent Face Recognition using Eigenface

Hlaing Htake Khaung Tin

Статья научная

Face recognition is the most successful form of human surveillance. Face recognition technology, is being used to improve human efficiency when recognition faces, is one of the fastest growing fields in the biometric industry. In the first stage, the age is classified into eleven categories which distinguish the person oldness in terms of age. In the second stage of the process is face recognition based on the predicted age. Age prediction has considerable potential applications in human computer interaction and multimedia communication. In this paper proposes an Eigen based age estimation algorithm for estimate an image from the database. Eigenface has proven to be a useful and robust cue for age prediction, age simulation, face recognition, localization and tracking. The scheme is based on an information theory approach that decomposes face images into a small set of characteristic feature images called eigenfaces, which may be thought of as the principal components of the initial training set of face images. The eigenface approach used in this scheme has advantages over other face recognition methods in its speed, simplicity, learning capability and robustness to small changes in the face image.

Бесплатно

Agent-based Modeling in doing Logic Programming in Fuzzy Hopfield Neural Network

Agent-based Modeling in doing Logic Programming in Fuzzy Hopfield Neural Network

Shehab Abdulhabib Saeed Alzaeemi, Saratha Sathasivam, Muraly Velavan

Статья научная

This paper introduces a new approach to enhance performance in performing logic programming in the Hopfield neural network by using agent-based modeling. Hopfield networks have been broadly utilized to solve problems of combinatorial optimization. However, this network yielded a satisfiability problem because the network has grown larger, and it is more complex. Therefore, an improved algorithm has been proposed to enhance the Hopfield network’s capability by using the technique of fuzzy logic to provide more efficient energy relaxation and to avoid the local minimum solutions. Agent-based modeling has been introduced in this paper to conduct computer simulations, which aim at verifying and validating the introduced approach. By applying the technique of fuzzy Hopfield neural network clustering in the system, better quality solutions are produced, and the network is handled better despite the increasing complexity. Also, the solutions converged faster by the system. Accordingly, this technique of the fuzzy Hopfield neural network clustering in the system has produced better-quality solutions.

Бесплатно

All-Optical Parity Circuits Using Nonlinear Directional Coupler

All-Optical Parity Circuits Using Nonlinear Directional Coupler

L. A.Bakhtiar, E. Yaghoubi, A. Adami, S. M. Hamidi, M. Hosseinzadeh

Статья научная

Since in the previous existing optical designs, the electronic-optic-electronic conversion has not been completely eliminated. Construction of the optical circuits with nonlinear waveguides can overcome this drawback. We have developed a nonlinear directional coupler theory to describe novel all-optical parity circuits. By using three channels, appropriate adjusting of the refractive indices, and selecting the correct length for coupling event, even/odd parity circuits can be obtained. The operation of these circuits is simulated with the aid of RSoft CAD-Layout (BeamPROP) simulator. Towards the end of the work, we compared the speed of our proposed novel circuit with the existing optical designs and also electronic structure of which we have a better result.

Бесплатно

Ambiguity in question paper translation

Ambiguity in question paper translation

Shweta Vikram, Sanjay K. Dwivedi

Статья научная

Word sense ambiguity is a prevalent nature of machine translation for various language pairs including English-Hindi language. For example, the word "paper" has several senses which may refer to a question paper, research paper, newspaper, simple paper or a white paper. The specific sense intended is determined by the context in which an instance of the ambiguous word appears. This specific sense which is determined by the context is known as Word Sense Disambiguation (WSD). Translation of question paper is a specific application of MT wherein any type of ambiguity in question may affect the overall meaning of questions. This paper discusses types of ambiguity in the context of question paper translation (English to Hindi) and their impact on translation by analyzing a set of questions taken from National Council of Educational Research and Training (NCERT) and some other resources.

Бесплатно

An Adaptable E-Learning Architecture Based on Learners' Profiling

An Adaptable E-Learning Architecture Based on Learners' Profiling

Maria Dominic, Sagayaraj Francis

Статья научная

These days modifications and supplements to e-learning are not enough to make them successful since flexibility and adaptability is missing. Different e-Learning architecture provide different kinds of learning experience to the learners. The lack of adaptive system is due to "One size fits for all" concept. Currently the research is towards to learner oriented platforms putting student motivation, habits, expectations and learning styles (additional Koper, R.; Burgos, D (2005)). The concept of adaptation has become a prominent issue in e-learning. Systems allow the users to change some system parameters and adapt their behavior accordingly is known as adaption process. Systems that adapt based on the systems assumption are called as adaptive systems (additional santally mohammed issack). Since the system adapts to a person and personalizes the learning process it can be also known as personalized system (additional Paramythis, A.; Loidl-Reisinger). So to serve the learning community better there was a necessity to profile them and identify their requirements and provide an adaptive e-learning architecture which suits the individuals needs better. So the main objective of this research was to provide an adaptive e-learning system architecture which satisfies Felder Silverman learning style. Felder-Silverman's learning model [FSLM] was chosen since FSLM synthesis of these theories can be designed to easily translate them into strategies into a university setup.

Бесплатно

An Aligned Assessment Item Authoring Environment based on Interoperability Standards

An Aligned Assessment Item Authoring Environment based on Interoperability Standards

Muhammad H. Zedan, Hesham A. Hassan

Статья научная

Standard representations support sharing assessment items and learning objects among learning environments. Different standards have been developed to provide interoperability-based descriptions for all learning aspects. Designing assessment items or questions using standard representations became a key point in learning/teaching domain. This paper proposes an environment for authoring assessment items using a combination of standards linked together to align the produced questions. The environment consists of a set of tools. The first tool is dedicated for building question body using IMS (Innovation, Adoption, and Learning) QTI (Question and Test Interoperability) standards. An extension to IMS QTI was designed to represent question Intended Learning Outcomes (ILOs), difficulty degree, assessed concepts, and target groups. The second tool manipulates competency definitions bank which is used in representing assessment item ILOs. The third tool deals with target groups to whom question will be delivered.

Бесплатно

An Analysis of Application Level Security in Service Oriented Architecture

An Analysis of Application Level Security in Service Oriented Architecture

Said Nabi, M. N. A. Khan

Статья научная

In computing, the software elements like objects and components emphasize on reusability using design tools of abstraction and separation of concerns. Software architecture has appeared as an initial idea to develop huge, complicated and heterogeneous distributed systems successfully. Service Oriented Architecture (SOA) combines services together to make systems having a greater impact on the way software systems are developed. SOA addresses the need of standards-based, loosely connected, and distributed computing which is protocol independent. It is not easy to ensure the secure transaction of data, where the movement of data occurs through loosely connected services. A number of techniques have been proposed in the contemporary literature to guide the SOA implementation in distributed system. These techniques offer certain benefits, but pose some challenges alongside such as the use of meta-data as framework and standard, contract documents, security patterns and security adviser, etc. The objective of this research is to provide a comprehensive analysis of various approaches used to provide application level security to the web services in SOA. These approaches have been compared based on a number of parameters. In addition, we critically evaluate different security methods used in SOA. The study also discusses some future directions in this domain.

Бесплатно

An Analysis of Performance Testing in Distributed Software Applications

An Analysis of Performance Testing in Distributed Software Applications

Muhammad Fraz Malik, M. N. A. Khan

Статья научная

Testing is a crucial step in designing and implementing software in the distributed environment. Testing in the distributed applications is not only difficult, but also a costly method. This Research briefly discusses the performance testing in the distributed software environment along with different other testing techniques proposed in the literature that correspond to distributed applications. Additionally, we discuss the key testing challenges faced during the whole process of testing the distributed applications. Much of the focus of this paper is on intelligent agent-based testing. Agent based testing is provide better coordination mechanism between multiple testers and exert more controllability and observablility on fault detection. In this study we have critically analyzed testing methodologies being practiced in the distributed environment. We have studied the merits and limitations of these methodologies proposed in the contemporary literature and have identified the possible improvements in those methodologies to make them more robust.

Бесплатно

An Analysis on Digital Watermarking in Videos based on Frequency Domain Techniques

An Analysis on Digital Watermarking in Videos based on Frequency Domain Techniques

Monasa Yengkhom, Pradeep Kumar Singh

Статья научная

As Watermarking have been considered as an emerging technique for copyright protection, data security and protection of ownership, several techniques and algorithms have been developed and created either in spatial domain or frequency domain mainly to achieve the properties of digital watermarking like robustness, imperceptibility, fidelity, etc. It is also found that the frequency domain techniques provides a better solution in obtaining these properties than the spatial domain. So, most researchers have used this domain in developing a good watermarking scheme for achieving robustness and other important properties of digital watermarking against all kinds of intentional and unintentional attacks. The attacks may include image processing attacks like compression, frame dropping, piracy, geometric distortions, loss of quality, etc. So, utmost importance must be given on how to create a scheme which can achieve robustness against all these attacks at the same time. The medium for watermarking is chosen as video because of its vast future scope So, in this paper, a thorough research on the various techniques available in watermarking based on frequency domain has been done to find out a secure technique that can withstand any kinds of attacks in a digital video.

Бесплатно

An Analysis on Performance of Decision Tree Algorithms using Student’s Qualitative Data

An Analysis on Performance of Decision Tree Algorithms using Student’s Qualitative Data

T.Miranda Lakshmi, A.Martin, R.Mumtaj Begum, V.Prasanna Venkatesan

Статья научная

Decision Tree is the most widely applied supervised classification technique. The learning and classification steps of decision tree induction are simple and fast and it can be applied to any domain. In this research student qualitative data has been taken from educational data mining and the performance analysis of the decision tree algorithm ID3, C4.5 and CART are compared. The comparison result shows that the Gini Index of CART influence information Gain Ratio of ID3 and C4.5. The classification accuracy of CART is higher when compared to ID3 and C4.5. However the difference in classification accuracy between the decision tree algorithms is not considerably higher. The experimental results of decision tree indicate that student’s performance also influenced by qualitative factors.

Бесплатно

An Analytical Study of the Use of Social Networks for Collaborative Learning in Higher Education

An Analytical Study of the Use of Social Networks for Collaborative Learning in Higher Education

Afnan A. Alkhathlan, Ahmad A. Al-Daraiseh

Статья научная

In recent years, the use of social networks has been growing at an unprecedented speed. Changing the way people communicate, interact and learn. Instead of passively consuming information, users are actively participating in the creation of knowledge, as a part of the social connection and interaction Social Networking Sites (SNSs) are built upon. And since learning, at abstract, is a social activity, educators around the world have been embracing the notion of incorporating social networks technology into the educational environment to support and enhance the teaching-learning experience. This work investigates the usage of social networks in higher education to support collaborative learning, improve the learning process and enhance students' engagement and academic achievements. A comprehensive review of the current literature is conducted to thoroughly analyze the use and impact of social networks on higher education students. In order to propose a framework for educational social networks that will support collaborative learning and enhance learning outcomes for higher education students.

Бесплатно

An Application of the Wiles Test in the Formulation of Education Strategy for the Newly-Upgraded Colleges of China

An Application of the Wiles Test in the Formulation of Education Strategy for the Newly-Upgraded Colleges of China

Xiaowen Zhu, Zhiwen Zhu

Статья научная

Using graduates from the newly-upgraded colleges as a sample, we used the Wiles test on the Human Capital Hypothesis vs. the Screening Hypothesis of education economics. The results were in favor of the former, i.e., higher education was more likely a production means than just a signal in the job market. Thus the newly-upgraded colleges should adjust their curriculum and faculty structure to accommodate the skill demands in job markets.

Бесплатно

An Appraisal of Off-line Signature Verification Techniques

An Appraisal of Off-line Signature Verification Techniques

Abdul Salam Shah, M. N. A. Khan, Asadullah Shah

Статья научная

Biometrics is being commonly used nowadays for the identification and verification of humans everywhere in the world. In biometrics humans unique characteristics like palm, fingerprints, iris etc. are being used. Pattern Recognition and image processing are the major areas where research on signature verification is carried out. Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions. The hand written signatures due to its importance are at target of fraudulence. In this paper we have surveyed different papers on techniques that are currently used for the identification and verification of Offline signatures.

Бесплатно

An Approach Towards Customized Multi-Tenancy

An Approach Towards Customized Multi-Tenancy

Muhammad Fahad Khan, Mirza Ahsan Ullah, Aziz-ur-Rehman

Статья научная

Multi-tenant applications are usually cloud based software services which can serve different users at the same time. This is done using single instance of applications by sharing hardware, infrastructure, data storage and virtualization. To achieve multi tenancy different approaches are there at every layer (Application, Data, hardware).Multi tenancy helps to minimize the effort needed for deployment and maintenance with an adequate level of security and privacy. Now a day the work is going on custom multi tenancy by sharing everything at each layer. This paper will describe the techniques of multi tenancy and how security, flexibility and scalability relate to each other when it comes to multi tenancy for customization.a

Бесплатно

An Approach for Discovering and Maintaining Links in RDF Linked Data

An Approach for Discovering and Maintaining Links in RDF Linked Data

Fatima Ardjani, Djelloul Bouchiha, Mimoun Malki

Статья научная

Many datasets are published on the Web using semantic Web technologies. These datasets contain data that represent links to similar resources. If these datasets are linked together by properly constructed links, users can easily query the data through a uniform interface, as if they were querying a single dataset. In this paper we propose an approach to discover (semi) automatically links between RDF data based on the description models that appear around the resources. Our approach also includes a (semi) automatic process to maintain links when a data-change occurs.

Бесплатно

An Approach to Solving Technical Difficulties Facing Non-CS Students in a Database Class

An Approach to Solving Technical Difficulties Facing Non-CS Students in a Database Class

Sukanya Suranauwarat

Статья научная

Today, an organization's biggest asset is its data. Knowledge of relational databases and SQL (Structured Query Language) is one of the most valued technical skills and in high demand in most organizations. Students of any major can benefit in their careers from learning these fundamental database concepts. At our school, database classes for both CS (Computer Science) and non-CS students are offered by our computer science faculty members. Teaching database concepts can be challenging especially to non-CS students. In this paper, we discuss the technical difficulties our non-CS students experience in their database class and an approach to solving these problems.

Бесплатно

Журнал