Статьи журнала - International Journal of Modern Education and Computer Science

Все статьи: 676

A Biometric Based: 3-D Ear Recognition System Combining Local and Holistic Features

A Biometric Based: 3-D Ear Recognition System Combining Local and Holistic Features

Akkas Ali, Mohammad. Mahfuzul Islam

Статья научная

This paper introduces an improved ear recognition approach based on 3 dimensional keypoint matching and combining local and holistic features. At first, the 3D keypoints are detected using the shape index image. The system consists of four primary steps: i) ear image segmentation; ii) local feature extraction and matching; iii) holistic feature extraction and matching; and iv) combination of local and holistic features at the match score level. For the segmentation purpose, we use an efficient skin segmentation algorithm, to localize a rectangular region containing the ear. For the local feature extraction and representation purpose, we use the Sparse Representation based Localized Feature Extraction. For the holistic matching component, we introduce a voxelization scheme for holistic ear representation. The match scores obtained from both the local and holistic matching components are combined to generate the final match scores.

Бесплатно

A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model

A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model

R.Manjula,J.Vaideeswaran

Статья научная

This Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach include continuous improvements in System quality and adhering to global standards. The increasing competency in IT and Educational Sectors necessitates a process maturity evaluation methodology. Accordingly, this paper presents an organizational maturity model for Education system for evaluating the maturity of multi- dimension factors and attributes of an Education System. Assessment questionnaires and a rating methodology comprise the framework of this Educational maturity model. The objective and design of the questionnaires are to collect information about the Education system engineering process from the multi perspectives of academic, infrastructure, administration, facilities etc. Furthermore, we conducted one case study and reported the assessment results using the organizational maturity model presented in this paper.

Бесплатно

A Centralized Controller as an Approach in Designing NoC

A Centralized Controller as an Approach in Designing NoC

Abdolhossein Fathi, Keihaneh Kia

Статья научная

This paper presents a new NoC architecture to improve flexibility and area consumption using a centralized controller. The idea behind this paper is improving SDN concept in NoC. The NoC routers are replaced with small switches and a centralized controller doing the routing algorithm and making control decisions. As one of the main desirable property of NoC is flexibility, in this work with the help of centralized controller, having different topologies and also having two separate networks in a single platform is possible. The other effects of this new scheme are power and area consumption which are investigated. Performance of the NoC is also studied with an analytical model and compared with the traditional NoC. The proposed NoC is implemented in VHDL, simulated and tested with ISE Xilinx.

Бесплатно

A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment

A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment

Andreas Bildstein, Junkang Feng

Статья научная

This article shows a novel approach to semantically align two domain contexts in a distributed system based on the theory of Information Flow [1], also known as Channel Theory. In this article, we propose a 2-step approach to cope with the increasing complexity in constructing the channels, when the channel theory is applied in a complex environment, for example in the area of smart manufacturing. We describe why the methods that had been used so far for constructing the channel might not be suitable for such a complex environment and introduce the main components of our approach. Furthermore, we are explaining how these components work together by using an example from the manufacturing area where product specifications have to be aligned with the production capabilities of manufacturing equipment. Within this example, in the first step a high-level description of production steps is mapped to production processes, and in the second step, a detailed description of the production steps in question is mapped to available equipment and tooling that is related to the filtered production processes from step 1.

Бесплатно

A Chinese Character Text Editor for Embedded System Education

A Chinese Character Text Editor for Embedded System Education

Ye Junjie, Yu Jianxin

Статья научная

A course project experiment plays a very important role in mastering a student embedded system software education. The paper gives the design and implementation solution to a Chinese character text editor for embedded system (CCTE for short), including requirement analysis, function design, task division, main process flow, Chinese character process, man-machine interface layout and test results. This course project can be used as a template for embedded system software experiment.

Бесплатно

A Classification Framework for Context-aware Mobile Learning Systems

A Classification Framework for Context-aware Mobile Learning Systems

Richard A.W. Tortorella, Kinshuk, Nian-Shing Chen, Sabine Graf

Статья научная

The field of context awareness is ever increasing due to the proliferation and omnipresent nature of mobile computing devices. Not only is learning becoming ubiquitous, but the sensors in mobile devices are permitting learning systems to adapt to the context of the learners. This paper provides a classification framework for the field of context-aware mobile learning, which is applied to papers published within selected journals from January 2009 to December 2015 inclusive. Obtained from the combined fields of context awareness and educational technology, a total of 2,968 papers are reviewed, resulting in 41 papers being selected for inclusion in this study. The classification framework consists of three layers: hardware architecture layer, context architecture layer and an evaluation layer. The framework will allow researchers and practitioners to quickly and accurately summarize the status of the current field of context-aware mobile learning. Furthermore, it has the potential to aid in future system development and decision making processes by showing the direction of the field as well as viable existing methods of system design and implementation.

Бесплатно

A Collaborative Framework for Web based Vocational Education and Training (VET); Findings from a Case Study

A Collaborative Framework for Web based Vocational Education and Training (VET); Findings from a Case Study

Irum Inayat, Rooh ul Amin, Zubaria Inayat, Khan Badshah

Статья научная

The growing need of trained human capital for economic empowerment and growth has increased the trend of vocational training through e-learning, worldwide. It serves as a major source of training professionals, technicians, skilled workers and students who are unable to carryout formal college education due to time, cost and distance. In this paper we have discussed several cases from literature that made use of e-learning based vocational education and training. Later we have proposed a collaborative framework for vocational education and training using e-learning on the basis of findings from the literature. The framework has been practically implemented in a real world case study and findings revealed that factors like student-student and student-teacher collaboration, individual assessment of students, availability of adequate support material aid in enhancing students' performance and learning outcomes.

Бесплатно

A Common Fixed Point Theorem for R-Weakly Commuting Maps Satisfying Property (E.A.) in Fuzzy Metric Spaces Using Implicit Relation

A Common Fixed Point Theorem for R-Weakly Commuting Maps Satisfying Property (E.A.) in Fuzzy Metric Spaces Using Implicit Relation

Saurabh Manro

Статья научная

The purpose of this paper is to prove a common fixed theorem for R-weakly commuting mappings via an implicit relation in fuzzy metric space. While proving our result, we utilize the idea of property (E.A.) due to Aamri and El. Moutawakil [1] together with common (E.A.) property due to Liu, Wu and Li [2].

Бесплатно

A Comparative Analysis of Cloud Simulators

A Comparative Analysis of Cloud Simulators

Pericherla S Suryateja

Статья научная

Cloud Computing is a new paradigm which allows individuals and organizations to purchase resources like compute, storage, networking etc as a utility with minimum human intervention. According to recent surveys more than half of the large to medium size organizations have already migrated to the cloud. Despite of providing resources as a utility and its wide spread acceptance in the IT community, cloud computing is still at its prime and poses many challenges like automated service provisioning, virtual machine migration, server consolidation, energy management, traffic analysis, data security, software frameworks which needs considerable amount of research to stabilize. Conducting research on live cloud environments for individuals or small institutions is very difficult due to the costs involved in setting up a cloud. This paper presents various cloud simulators which were developed over the years that are a cost effective way of conducting cloud research tasks. This paper compares almost 17 cloud simulators based on diverse criteria and the result and explanations are presented which enables new researchers to choose a suitable cloud simulator.

Бесплатно

A Comparative Study of Software Inspection Techniques for Quality Perspective

A Comparative Study of Software Inspection Techniques for Quality Perspective

Asad Masood Qazi, Sidra Shahzadi, Mamoona Humayun

Статья научная

Software inspection is useful to detect the defects in any stage software development methodology especially in early stages. Inspection of software defects can improve the software product quality by decreasing rework cost and time from documents, code, and other deliverables. The objective of this study is to identify existing software inspection techniques which help practitioners and software engineers to improve the software quality and to compare them according to some quality attributes. Rather than proposing new techniques we focus on synthesize the existing approaches. A comparison of some approaches is conducted and analyzed which approach is more feasible for the detection of defects. The results of this study show that there are many formal and informal techniques available in literature related software inspection, it is difficult to say well to one of them, but our analysis focused on finding such techniques which cover maximum quality factors in an inspection. Software inspection is an umbrella activity of whole software development life cycle and we found different approaches and frameworks in software inspection which can full fill our desired parameters to improve software quality.

Бесплатно

A Correlation Framework for different Resource Access Protocol in Real Time System

A Correlation Framework for different Resource Access Protocol in Real Time System

Leena Das, Susmita Saha

Статья научная

We know various scheduling algorithm like EDF, RMA that are popularly used for sharing a set of serially reusable resources. But for share non preemptable resources those algorithm cannot satisfactorily be used. The main intent of resource access protocol is to schedule, and synchronizes the tasks when many tasks use same resources, means where resource is shared. So here in this paper the traditional techniques of resource access protocol which are used to share critical resources among a set of real time tasks, is discussed. This paper is mainly focusing on the different types of resource access protocols and their comparisons.

Бесплатно

A Cost Efficient Solution for Surface Technology with Mobile Connect

A Cost Efficient Solution for Surface Technology with Mobile Connect

Nitin Sharma, Manshul V Belani, Indu Chawla

Статья научная

For the past few decades we have seen the evolution of user interfaces from CLI (Command Line Interface) to GUI (Graphical User Interface) to the most recent NUI (Natural User Interfaces). One such example is Surface Computing. Surface computing is a new way of working with computers that moves beyond the traditional mouse-and-keyboard experience. It is a natural user interface that allows people to interact with digital content with their hands, with gestures and by putting real-world objects on the surface. Though very convenient and simple to use, the cost of this technology is one of the major hindrances in making it accessible to common users. Microsoft PixelSense is an excellent example of this technology. For making this technology cost efficient and more accessible, we have designed an interactive table. It allows two mobile phones to interact with each other, i.e. one can share mobile content just by placing two phones on the table and dragging the content from one phone to another using their fingers. Instead of the usual resistive and capacitive touchscreens used these days, it uses an imaging touch screen, i.e. image processing is used to determine the fingertip coordinates and handle data according to these coordinates thereby decreasing the cost of this technology sharply.

Бесплатно

A Criterion for Hurwitz Polynomials and its Applications

A Criterion for Hurwitz Polynomials and its Applications

Liejun Xie

Статья научная

We present a new criterion to determine the stability of polynomial with real coefficients. Combing with the existing results of the real and negative roots discrimination, we deduced the explicit conditions of stability for any real polynomial with a degree no more than four. Meanwhile, we discussed the problem of controls system stability and inertia of Bezout matrix as the applications of the criterion. A necessary and sufficient condition to determine the stability of the characteristic polynomial of the continuous time control systems was proposed. And also, we discussed a pathological case of the bilinear transformation, which can convert the stability analysis of a given discrete time system to the corresponding continuous time system, and brought forward an alternative one.

Бесплатно

A Design of Learning Management System for Electronic Secretary Based on Ubiquitous Learning

A Design of Learning Management System for Electronic Secretary Based on Ubiquitous Learning

Guangran Liu, Bencai Gao, Jun Lou

Статья научная

The proposed ubiquitous computing creates a new calculation model. Ubiquitous learning based on ubiquitous computing is the trend of current study theory. This paper introduces the concept of ubiquitous learning, analyzes and summarizes its thoughts and main characteristics, constructs the model of a ubiquitous learning environment. With the guidance of constructed ubiquitous learning environment model, we design the management system for electronic course-lattice, and use the metaphor of secretary naming the management system as electronic secretary.

Бесплатно

A Driving Behavior Retrieval Application for Vehicle Surveillance System

A Driving Behavior Retrieval Application for Vehicle Surveillance System

Fu Xianping, Men Yugang, Yuan Guoliang

Статья научная

Vehicle surveillance system provides a large range of informational services for the driver and administrator such as multiview road and driver surveillance videos from multiple cameras mounted on the vehicle, video shots monitoring driving behavior and highlighting the traffic conditions on the roads. How to retrieval driver’s specific behavior, such as ignoring pedestrian, operating infotainment, near collision or running the red light, is difficult in large scale driving data. Annotation and retrieving of these video streams has an important role on visual aids for safety and driving behavior assessment. In a vehicle surveillance system, video as a primary data source requires effective ways of retrieving the desired clip data from a database. And data from naturalistic studies allow for an unparalleled breadth and depth of driver behavior analysis that goes beyond the quantification and description of driver distraction into a deeper understanding of how drivers interact with their vehicles. To do so, a model that classifies vehicle video data on the basis of traffic information and its semantic properties which were described by driver’s eye gaze orientation was developed in this paper. The vehicle data from OBD and sensors is also used to annotate the video. Then the annotated video data based on the model is organized and streamed by retrieval platform and adaptive streaming method. The experimental results show that this model is a good example for evidence-based traffic instruction programs and driving behavior assessment.

Бесплатно

A Dynamic Probabilistic Broadcasting Scheme based on Cross-Layer design for MANETs

A Dynamic Probabilistic Broadcasting Scheme based on Cross-Layer design for MANETs

Qing-wen WANG, Hao-shan Shi, Qian Qi

Статья научная

Broadcasting plays a fundamental role in transmitting a message from the sender to the rest of the network nodes in Mobile Ad hoc Networks (MANETs). The blind flooding scheme causes a broadcast storm problem, which leads to significant network performance degradation. In order to solve the problem, a dynamic probabilistic broadcasting scheme cross-layer design for MANETs (DPBSC) is proposed. DPBSC adopts the cross-layer design, which lets routing layer share the received signal power information at MAC layer while still maintaining separation between the two layers. The additional transmission range that can benefit from rebroadcast is calculated according to the received signal power, which is applied to dynamically adjust the rebroadcast probability. DPBSC reduces the redundant retransmission and the chance of the contention and collision in the networks. Simulation results reveal that the DPBSC achieves better performance in terms of the saved-rebroadcast, the average packet drop fraction, the average number of collisions and average end-to-end delay at expense of the throughput, which is respectively compared with the blind flooding and fixed probabilistic flooding applied at the routing layer while IEEE 802.11 at the MAC layer.

Бесплатно

A Face Recognition System by Embedded Hidden Markov Model and Discriminating Set Approach

A Face Recognition System by Embedded Hidden Markov Model and Discriminating Set Approach

Vitthal Suryakant Phad, Prakash S. Nalwade, Prashant M. Suryavanshi

Статья научная

Different approaches have been proposed over the last few years for improving holistic methods for face recognition. Some of them include color processing, different face representations and image processing techniques to increase robustness against illumination changes. There has been also some research about the combination of different recognition methods, both at the feature and score levels. Embedded hidden Markov model (E-HHM) has been widely used in pattern recognition. The performance of Face recognition by E-HMM heavily depends on the choice of model parameters. In this paper, we propose a discriminating set of multi E-HMMs based face recognition algorithm. Experimental results illustrate that compared with the conventional HMM based face recognition algorithm the proposed method obtain better recognition accuracies and higher generalization ability.

Бесплатно

A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

S.Selvakani Kandeeban, R.S.Rajesh

Статья научная

The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence new signatures for novel attacks can be troublesome, time consuming and has high false alarm rate. To achieve this, system was trained and tested with known and unknown patterns with the help of Radial Basis Functions (RBF). KDD 99 IDE (Knowledge Discovery in Databases Intrusion Detection Evaluation) data set was used for training and testing. The IDS is supposed to distinguish normal traffic from intrusions and to classify them into four classes: DoS, probe, R2L and U2R. The dataset is quite unbalanced, with 79% of the traffic belonging to the DoS category, 19% is normal traffic and less than 2% constitute the other three categories. The usefulness of the data set used for experimental evaluation has been demonstrated. The different metrics available for the evaluation of IDS were also introduced. Experimental evaluations were shown that the proposed methods were having the capacity of detecting a significant percentage of rate and new attacks.

Бесплатно

A Framework for Adaptation of Virtual Data Enumeration for Enhancing Census – Tanzania Case Study

A Framework for Adaptation of Virtual Data Enumeration for Enhancing Census – Tanzania Case Study

Ramadhani A. Duma

Статья научная

Population census is an enormous and challenging national exercise with many stakeholders whose participation is required at all levels of government or public administration. The problem of high cost in conducting the traditional census process imposes extra and unaffordable cost in most of the developing countries which resulted into ten-year defaulting for census enumerations. This challenge compels nations to seek for assistance mostly from various donors nations in every census enumerations exercise. Virtual Census enumerations play a vital role in demographic data enumerations since it does not require physical involvement in Enumeration Area as in traditional enumerations approach. In this paper the main focus is on data integration from different heterogeneous sources, addressing cleansing challenge for data integrated from data sources with no common key for integrations, building virtual data integration framework for enhancing virtual censuses enumeration process. The developed framework and algorithms can be used to guide design of any other data integration system that need to address similar challenges in related aspects. The outcome of this work is suitable and cheaper technique of demographic data enumeration as compared to traditional technique which involves a lot of manual works and processes.

Бесплатно

A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud

A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud

Mahmoud Fahsi, Sidi Mohamed Benslimane, Amine Rahmani

Статья научная

Professional use of cloud health storage around the world implies Information-Retrieval extensions. These developments should help users find what they need among thousands or billions of enterprise documents and reports. However, extensions must offer protection against existing threats, for instance, hackers, server administrators and service providers who use people's personal data for their own purposes. Indeed, cloud servers maintain traces of user activities and queries, which compromise user security against network hackers. Even cloud servers can use those traces to adapt or personalize their platforms without users' agreements. For this purpose, we suggest implementing Private Information Retrieval (PIR) protocols to ease the retrieval task and secure it from both servers and hackers. We study the effectiveness of this solution through an evaluation of information retrieval time, recall and precision. The experimental results show that our framework ensures a reasonable and acceptable level of confidentiality for retrieval of data through cloud services.

Бесплатно

Журнал