scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Modern Education and Computer Science in 2012"


Journal ArticleDOI
TL;DR: The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.
Abstract: Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the raw data before embedding it in the image. Though the encryption process increases the time complexity, but at the same time provides higher security also. This paper uses two popular techniques Rivest, Shamir, Adleman (RSA) algorithm and Diffie Hellman algorithm to encrypt the data. The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.

134 citations


Journal ArticleDOI
TL;DR: The experimental results demonstrate that the watermarks generated with the proposed algorithm are invisible and the quality of watermarked image and the recovered image are improved.
Abstract: We have implemented a robust image watermarking technique for the copyright protection based on 3-level discrete wavelet transform (DWT). In this technique a multi-bit watermark is embedded into the low frequency sub-band of a cover image by using alpha blending technique. The insertion and extraction of the watermark in the grayscale cover image is found to be simpler than other transform techniques. The proposed method is compared with the 1-level and 2-level DWT based image watermarking methods by using statistical parameters such as peak-signal-to-noise-ratio (PSNR) and mean square error (MSE). The experimental results demonstrate that the watermarks generated with the proposed algorithm are invisible and the quality of watermarked image and the recovered image are improved.

123 citations


Journal ArticleDOI
TL;DR: The review of literature shows that teachers need to make full use of multimedia to create an authentic language teaching and learning environment where students can easily acquire a language naturally and effectively.
Abstract: The use of multimedia in teaching and learning leads to higher learning. Multimedia refers to any computer-mediated software or interactive application that integrates text, color, graphical images, animation, audio sound, and full motion video in a single application. Multimedia learning systems offer a potentially venue for improving student understanding about language. Teachers try to find the most effective way to create a better foreign language teaching and learning environment through multimedia technologies. In this paper, the researcher defines multimedia, elaborates the rationale for using multimedia, identifies multimedia learning, mentions principles of multimedia, explains theoretical basis of multimedia English teaching, reviews roles of teachers and learners in multimedia environment, discusses the relationship between multimedia and learning, and states the strength of multimedia English teaching. The review of literature shows that teachers need to make full use of multimedia to create an authentic language teaching and learning environment where students can easily acquire a language naturally and effectively.

99 citations


Journal ArticleDOI
TL;DR: Learning styles, teaching styles match or mismatch between learning and teaching styles, visual, auditory, and kinesthetic learning styles among Iranian learners, and pedagogical implications for the EFL/ESL classroom are explained.
Abstract: It is important to study learning styles because recent studies have shown that a match between teaching and learning styles helps to motivate studentsprocess of learning. That is why teachers should identify their own teaching styles as well as their learning styles to obtain better results in the classroom. The aim is to have a balanced teaching style and to adapt activities to meet studentsstyle and to involve teachers in this type of research to assure the results found in this research study. Over 100 students complete a questionnaire to determine if their learning styles are auditory, visual, or kinesthetic. Discovering these learning styles will allow the students to determine their own personal strengths and weaknesses and learn from them. Teachers can incorporate learning styles into their classroom by identifying the learning styles of each of their students, matching teaching styles to learning styles for difficult tasks, strengthening weaker learning styles. The purpose of this study is to explain learning styles, teaching styles match or mismatch between learning and teaching styles, visual, auditory, and kinesthetic learning styles among Iranian learners, and pedagogical implications for the EFL/ESL classroom. A review of the literature along with analysis of the data will determine how learning styles match the teaching styles.

78 citations


Journal ArticleDOI
TL;DR: This paper is an attempt to look at EFL learners' motivation in learning a foreign language from a theoretical approach and includes a definition of the concept, the importance of motivation, specific approaches for generating motivation, differences between integrative and instrumental motivation, difference between intrinsic and extrinsic motivation, factors influencing motivation, and adopting motivational teaching practice.
Abstract: Motivation has been called the ―neglected heart‖ of language teaching. As teachers, we often forget that all of our learning activities are filtered through our students' motivation. In this sense, students control the flow of the classroom. Without student motivation, there is no pulse, there is no life in the class. When we learn to incorporate direct approaches to generating student motivation in our teaching, we will become happier and more successful teachers. This paper is an attempt to look at EFL learners' motivation in learning a foreign language from a theoretical approach. It includes a definition of the concept, the importance of motivation, specific approaches for generating motivation, difference between integrative and instrumental motivation, difference between intrinsic and extrinsic motivation, factors influencing motivation, and adopting motivational teaching practice.

70 citations


Journal ArticleDOI
TL;DR: It is shown that the effect of dust accumulation on the solar panel naturally is shown and how it is possible to overcome this problem.
Abstract: Energy is considered a prime agent in the generation of wealth and a significant factor in economic development. Limited fossil resources and environmental problems associated with them have emphasized the need for new sustainable energy supply options that use renewable energies. Among available technologies for energy production from solar source, photovoltaic system could give a significant contribution to develop a more sustainable energy system. Solar Panel has its wide use starting from a simple 5W diode lamp to a few kW ac drives. A solar panel with a battery and a charge controller and other auxiliary devices like dc to ac converters constitute a Solar Home System (SHS).Solar home system (SHS) is becoming popular day by day and even poor households are now becoming interested to purchase solar home system due to its various advantages. Solar home systems (SHS) have a major problem that is low efficiency. It also decreases output day by day because of improper maintenances, effect of dust and shadow. Accumulation of dust on solar panel of solar photovoltaic (PV) system is a natural process. It was found from the study that the accumulated dust on the surface of photovoltaic solar panel can reduce the system"s efficiency by up to 35% in one month .In this paper we show that the effect of dust accumulation on the solar panel naturally and how it is possible to overcome this problem.

51 citations


Journal ArticleDOI
TL;DR: Given the non-stop nature of technical support for eLearning, HEIs are facing issues in creating robust infrastructural facilities that are both competitive with the external environment and compatible with the internal user requirements.
Abstract: Information and communication technologies (ICTs) have provided several tools to facilitate higher education. However, their effective use demands technical expertise to achieve the required academic goals. The university constituents (teachers, students and administrators) are given eTraining but this is not enough. Every eLearning system establishes a basic 'infrastructure' of computers, networks, communications and a technical department filled with ICT professionals to consistently maintain and upgrade the infrastructure, train the users and continuously provide technical support as and when required by them. Given the non-stop nature of technical support for eLearning, HEIs are facing issues in creating robust infrastructural facilities that are both competitive with the external environment and compatible with the internal user requirements. This article is a compendium of the touchy aspects in sustained technical support for eLearning in HEIs.

41 citations


Journal ArticleDOI
TL;DR: In this article, the authors presented a new steganography algorithm to hide any small encrypted secret message inside QR Code TM, which is then randomized and then, finally embed that randomized QR Code inside some common image.
Abstract: Due to tremendous growth in communication technology, now it is a real problem / challenge to send some confidential data / information through communication network. For this reason, Nath et al. developed several information security systems, combining cryptography and steganography together, and the present method, ASA_QR, is also one of them. In the present paper, the authors present a new steganography algorithm to hide any small encrypted secret message inside QR Code TM , which is then randomized and then, finally embed that randomized QR Code inside some common image. Quick Response Codes (or QR Codes) are a type of two-dimensional matrix barcodes used for encoding information. It has become very popular recently for its high storage capacity. The present method is ASA_QR is a combination of strong encryption algorithm and data hiding in two stages to make the entire process extremely hard to break. Here, the secret message is encrypted first and hide it in a QR Code TM and then again that QR Code TM is embed in a cover file (picture file) in random manner, using the standard method of steganography. In this way the data, which is secured, is almost impossible to be retrieved without knowing the cryptography key, steganography password and the exact unhide method. For encrypting data The authors used a method developed by Nath et al i.e. TTJSA, which is based on generalized modified Vernam Cipher, MSA and NJJSA method; and from the cryptanalysis it is seen that TTJSA is free from any standard cryptographic attacks, like differential attack, plain-text attack or any brute force attack. After encrypting the data using TTJSA,the authors have used standard steganographic method To hide data inside some host file. The present method may be used for sharing secret key, password, digital signature etc.

38 citations


Journal ArticleDOI
TL;DR: In this study, the performance issues in cloud computing are discussed and a number of schemes pertaining to QoS issues are critically analyzed to point out their strengths and weaknesses.
Abstract: Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform that offers efficient data processing coupled with better QoS at a lower cost. The on-demand dynamic and scalable resource allocation is the main motif behind the development and deployment of cloud computing. The potential growth in this area and the presence of some dominant organizations with abundant resources (like Google, Amazon, Salesforce, Rackspace, Azure, GoGrid), make the field of cloud computing more fascinating. All the cloud computing processes need to be in unanimity to dole out better QoS i.e., to provide better software functionality, meet the tenant's requirements for their desired processing power and to exploit elevated bandwidth.. However, several technical and functional e.g., pervasive access to resources, dynamic discovery, on the fly access and composition of resources pose serious challenges for cloud computing. In this study, the performance issues in cloud computing are discussed. A number of schemes pertaining to QoS issues are critically analyzed to point out their strengths and weaknesses. Some of the performance parameters at the three basic layers of the cloud — Infrastructure as a Service, Platform as a Service and Software as a Service — are also discussed in this paper.

38 citations


Journal ArticleDOI
TL;DR: A new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced Caesar Cipher method, TTJSA method, Bit wise Rotation and Reversal method to make the entire crypto system very hard to break is presented.
Abstract: In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced Caesar Cipher method, TTJSA method, Bit wise Rotation and Reversal method. The encryption method consists of three basic steps: 1) Encryption Technique using Advanced Caesar Cipher, 2) Encryption Technique using TTJSA Algorithm, and 3) Encryption Technique using Bit wise Rotation and Reversal. TTJSA Algorithm, used in this method, is again a combination of generalized modified Vernam Cipher method, MSA method and NJJSAA method. Nath et al. already developed some symmetric key encryption methods namely MSA, DJSA, DJJSA, modified DJJSA, NJJSA, TTJSA, TTSJA, DJMNA, UES-I, UES-II etc. The cryptanalysis shows that TTJSA is free from standard cryptographic attacks such as differential attack, plain text attack or any brute force attack. In the present method the authors have used advanced modified Caesar Cipher method where the authors have modified the standard Caesar Cipher method and then they applied TTJSA method to make the entire crypto system very hard to break. The present method has been tested on different plain text specially with repeated character and the spectral analysis of the plain text and the encrypted is also been shown. The spectral analysis shows that the present cryptography method, SJA can not be broken with any kind of standard cryptography attack. The authors propose that the present method will be most suitable for password, SMS or any kind of small message encryption.

37 citations


Journal ArticleDOI
TL;DR: In this paper a blended learning model for higher education where traditional classroom lectures are supported via e-learning is presented.
Abstract: Education is one of the areas that are experiencing phenomenal changes as a result of the advancement and use of information technology. Mobile and e-learning are already facilitating the teaching and learning experience with the use of latest channels and technologies. Blended learning is a potential outcome of advanced technology based learning system. The charm of blended learning approach lies in the adaptation of technology aided learning methods in addition to the existing traditional based learning. With the introduction of technology, the overall learning as well as teaching experience is considerably enhanced by covering negative aspects of the traditional approach. In this paper a blended learning model for higher education where traditional classroom lectures are supported via e-learning.

Journal ArticleDOI
TL;DR: The paper recommends that principals should make provision for guidance and counseling on the school time table, and secondary school ICT adoption should be encouraged by the ministry of education.
Abstract: The importance of guidance and counseling programme in secondary schools, include bringing to the students an increased understanding of the educational, vocational and social information needed to make wise choices. In our society there are many influencing forces responsible for the gradual recognition of formal guidance to young people in various educational levels. This review paper focuses on the role of ICT on guidance and counseling in secondary schools. Counseling is a form of education, which the students receive from their counselors. The essence of incorporating guidance and counseling into the school system was to eliminate overwhelming ignorance of many young people on their choices of career prospects and personality maladjustment among school children. The role of ICT in guidance can be seen in three ways: as a tool, as an alternative, or as an agent of change. The growth of websites and help lines as forms of technically mediated service delivery means that the potential of ICT as a change agent is now greater than ever before. The telephone, websites and e-mail, alongside face-to-face facilities, could be alternative services; or they could be portals into a wide, flexible and well-harmonized network of services. The paper recommends that principals should make provision for guidance and counseling on the school time table. Most importantly secondary school ICT adoption should be encouraged by the ministry of education.

Journal ArticleDOI
TL;DR: This paper has made study about the awareness and impact of E-Learning in selected rural areas in India, the providers and learners ratio and an analysis on the collected data has been made to find the advantages and their affect on social and mental development of the individuals belonging to rural areas.
Abstract: E-Learning is referred to as teaching and learning by using electronic media. This methodology supports the use of networking and communications technology in teaching and learning. E-Learning is generally meant for remote learning or distance learning, but can also be used in face-to-face mode. In this paper we have made study about the awareness and impact of E-Learning in selected rural areas in India, the providers and learners ratio and an analysis on the collected data has been made to find the advantages of E-Learning resources and their affect on social and mental development of the individuals belonging to rural areas. Index Terms—E-Learning, media, rural-area, E-Learner

Journal ArticleDOI
TL;DR: This paper looks into different defect prevention techniques and analyses them critically and restricted to the identification of the modern trends in defect prevention.
Abstract: Most of the software projects fail to meet the desired level of quality and standards due to different types of defects introduced during the course of requirement solicitation, designing and development. These defects inexorably hinder the secure deployment or smooth operations of the software systems. One of the key reasons for this misfortune is the lack of proper defect prevention planning while formulating the software architecture. Defect prevention needs to be a thorough and critical phase because it has a direct impact on quality of the product which cannot be compromised. This paper looks into different defect prevention techniques and analyses them critically. The scope of this study is restricted to the identification of the modern trends in defect prevention.

Journal ArticleDOI
TL;DR: There is a relationship effect between the availability of the requirements and the success of the implementation process of the e-assessments system and there is a difference in the members attitudes of the research samples over the impact of which variables are most influenced.
Abstract: This study aims to identify the attitudes of the sample individuals from students that have used the electronic assessments (e-assessments) system at Isra University in Jordan. These attitudes describe the relationship between the availability of the requirements for e-assessments applications and the success of its implementation. Analytical descriptive method and sample research have been used. The samples included 246 students from 5 colleges covered by the research sample. The instrument of the study was a questionnaire which consisted of many variables that measured influential relationship among them. The research concluded that there is a relationship effect between the availability of the requirements and the success of the implementation process of the e-assessments system. There is a difference in the members attitudes of the research samples over the impact of which variables are most influenced. The results showed that there is a variation in the attitudes on all variables.

Journal ArticleDOI
TL;DR: The findings of the study indicate that the gap of gender difference does exist in the sphere of information literacy and the result of t-test for two groups of male and female students shows significant difference in terms of mean scores obtained in information consciousness, information competency and information ethics tests.
Abstract: Information literacy (IL) forms the basis of lifelong learning and plays very important role for students majoring in science and engineering. As far as higher education concerned, gender differences to may influence students’ academic achievements. In order to evaluate the gender differences on information literacy of undergraduates, we surveyed certain undergraduates using self-made questionnaire. The data of the survey was analyzed by SPSS. The findings of the study indicate that the gap of gender difference does exist in the sphere of information literacy. The result of t-test for two groups of male and female students shows significant difference in terms of mean scores obtained in information consciousness, information competency and information ethics tests.

Journal ArticleDOI
TL;DR: The tumour can be detected by using wavelet based adaptive windowing technique which is capable of detecting lesions of very different sizes.
Abstract: Mammography is the most effective procedure for the early detection of breast diseases. Mammogram analysis refers the processing of mammograms with the goal of finding abnormality presented in the mammogram. In this paper, the tumour can be detected by using wavelet based adaptive windowing technique. Coarse segmentation is the first step which can be done by using wavelet based histogram thresholding where, the thereshold value is chosen by performing 1-D wavelet based analysis of PDFs of wavelet transformed images at different channels. Fine segmentation can be done by partitioning the image into fixed number of large and small windows. By calculating the mean, maximum and minimum pixel values for the windows a threshold value has been obtained. Depending upon the threshold values the suspicious areas have been segmented. Intensity adjustment is applied as a preprocessing step to improve the quality of an image before applying the proposed technique. The algorithm is validated with mammograms in Mammographic Image Analysis Society Mini Mammographic database which shows that the proposed technique is capable of detecting lesions of very different sizes.

Journal ArticleDOI
TL;DR: Using multimedia is extremely important in distance education as a lecturer is usually not physically present with the participants to draw their attention, motivate them to learn and explain the content that students are having difficulty understanding.
Abstract: Distance education can be very effective use of instructional materials with visual, auditory, audiovisual and multimedia content. Visual content can be in the form of text, drawings, pictures, graphics and models, and the like. Auditory facilities are oral presentation or a speech, musical accompaniment, different sounds, etc.. Audiovisual content combine visual and auditory content, usually in the form of television shows, films or videos. Multimedia, combining text, images, sound, animation and video, and playing them before they used very different means, although in recent times for playing multimedia files commonly used multimedia computer, a data storage CD-ROM or the Internet. Using multimedia is extremely important in distance education as a lecturer is usually not physically present with the participants to draw their attention, motivate them to learn and explain the content that students are having difficulty understanding. Index Terms — Multimedia, Internet, Distance Education, E-Learning, Information and Communication Technology.

Journal ArticleDOI
TL;DR: This model proves that if the geometricmean reactive-ness to love is smaller than the geometric mean forgetting coefficient and the system is asymptotically stable if the ratio of appeals is greater than the reciprocal of ratio of mutual intensiveness coefficient.
Abstract: The human behavior is a combination of several feelings. There are two cases whether a person likes other individual or not. The liking of an individual leads to love and finally happiness. The feelings of love may be in different forms but here considered to be partners' love. There are three aspects of love for the partner: forgetting process (oblivion), the pleasure of being loved (return), and the reaction to the appeal of the partner (instinct). Along with that the appeals and the personalities of the two individuals do not vary in time. This model proves that if the geometric mean reactive-ness to love is smaller than the geometric mean forgetting coefficient and the system is asymptotically stable if the ratio of appeals is greater than the reciprocal of ratio of mutual intensiveness coefficient.

Journal ArticleDOI
TL;DR: An OCR (optical character recognition) system for the handwritten Gurmukhi numerals with average recognition accuracy of 88.83% has been achieved.
Abstract: This paper presents an OCR (optical character recognition) system for the handwritten Gurmukhi numerals. A lot of work has been done in recognition of characters and numerals of various languages like English, Chinese, and Arabic etc. But in case of handwritten Gurmukhi script very less work has been reported. Different Wavelet transforms are used in this work for feature extraction. Also zonal densities of different zones of an image have been used in the feature set. In this work, 100 samples of each numeral character have been used. The back propagation neural network has been used for classification. An average recognition accuracy of 88.83% has been achieved.

Journal ArticleDOI
TL;DR: The paper describes all the theoretical and practical issues so that even a novice researcher could use Galactica System in his/her works.
Abstract: The Galactica System is intended for resolving N-body interaction problems. It is based on a high-precision method for solving differential equations of motion of bodies whose interaction forces are inversely proportional to the squared distance. The differential equations of motion and their solution method are given in paper. The structure of the input file, the files of initial conditions and output files are described. The examples of these files for different solved tasks are presented. The actions of executable files are explained. The paper describes all the theoretical and practical issues so that even a novice researcher could use Galactica System in his/her works.

Journal ArticleDOI
TL;DR: The main purpose of this paper was to find out the effect of blended learning (BL) approach on the students' performance in education subjects and presents instructional strategies on how to effectively integrate content, pedagogy and technology to enhance the teaching and learning of education courses.
Abstract: With the fast developing and changing transport of technology, new trends and learning opportunities were ushered in the field of Education. This transformation restructures the teaching-learning operation. As a result, educators encounter different learning preferences of students due to the emerging learning needs brought by technology. Although many universities here and abroad recognize the potential of blended learning, there is still lack of implementation on how blended learning be planned, designed and applied. In response to this need, an empirical study on the use of blended learning approach was conducted, which involved the mixing of face-to-face and online delivery methods. Thus, the main purpose of this paper was to find out the effect of blended learning (BL) approach on the students' performance in education subjects. Additionally, this work presents instructional strategies on how to effectively integrate content, pedagogy and technology to enhance the teaching and learning of education courses. This provided the most effective and efficient learning experiences on both teachers and learners with its practical applications against retailed software which often burden many universities. Finally, some implications on how to effectively blend pedagogy and technology, which inevitably lead to significant enhancement of the curriculum, were also discussed.

Journal ArticleDOI
TL;DR: In this article, the authors proposed a biometric palm print lines extraction using image processing morphological operation, which achieved the total success rate (TSR) of the experiment is 100%.
Abstract: Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is a unique and reliable biometric characteristic with high usability. A palm print refers to an image acquired of the palm region of the hand. The biometric use of palm prints uses ridge patterns to identify an individual. Palm print recognition system is most promising to recognize an individual based on statistical properties of palm print image. It is rich in its features: principal lines, wrinkles, ridges, singular points and minutiae points. This paper proposes a Biometric Palm print lines extraction using image processing morphological operation. The proposed work discusses the significance; since both the palm print and hand shape images are proposed to extract from the single hand image acquired from a sensor. The basic statistical properties can be computed and are useful for biometric recognition of individual. This result and analysis will result into Total Success Rate (TSR) of experiment is 100%. This paper discusses proposed work for biometric recognition of individual by using basic statistical properties of palm print image. The experiment is carried out by using MATLAB software image processing toolbox.

Journal ArticleDOI
TL;DR: Two phases such as feature extraction phase and classification phase of the proposed system produced very promising recognition rates for applications with same set of features and classifiers, which is also real- time capable and automatic.
Abstract: Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them have still disadvantage such as not complete reflection about face structure, face texture. The features set is applied to three different applications: face recognition, facial expressions recognition and gender classification, which produced the reasonable results in all database. In this paper described two phases such as feature extraction phase and classification phase. The proposed system produced very promising recognition rates for our applications with same set of features and classifiers. The system is also real- time capable and automatic.

Journal ArticleDOI
TL;DR: To analyze the dynamic pattern of DF/DHF/DSS outbreaks, all cases were positioned in space and time by addressing the respective villages and this methodology is general and can be applied in other application fields such as dengue outbreak or other diseases during natural disasters.
Abstract: This study employed geographic information systems (GIS) to analyze the spatial factors related to dengue fever (DF), dengue hemorrhagic fever (DHF), and dengue shock syndrome (DSS) epidemics. Chachoengsao province, Thailand, was chosen as the study area. This study examines the diffusion pattern of disease. Clinical data including gender and age of patients with disease were analyzed. The hotspot zonation of disease was carried out during the outbreaks for years 2001 and 2007 by using local spatial autocorrelation statistics (LSAS) and kernel-density estimation (KDE) methods. The mean center locations and movement patterns of the disease were found. A risk zone map was generated for the incidence. Data for spatio-temporal analysis and risk zonation of DF/DHF/DSS were employed for years 2000 to 2007. Results found that the age distribution of the cases was different from the general population’s age distribution. Taking into account that the quite high incidence of DF/DHF/DSS cases was in the age group of 13-24 years old and the percentage rate of incidence was 42.9%, a DF/DHF/DSS virus transmission out of village is suspected. An epidemic period of 20 weeks, starting on 1st May and ending on 31st September, was analyzed. Approximately 25% of the cases occurred between Weeks 6-8. A pattern was found using mean centers of the data in critical months, especially during rainy season. Finally, it can be identified that from the total number of villages affected (821), the highest risk zone covered 7 villages (0.85%); the moderate risk zone comprised 39 villages (4.75%); for the low risk zone 22 villages (2.68%) were found; the very low risk zone consisted of 120 villages (14.62%); and no case occurred in 633 villages (77.10%). The zones most at risk were shown in districts Mueang Chachoengsao, Bang Pakong, and Phanom Sarakham. This research presents useful information relating to the DF/DHF/DSS. To analyze the dynamic pattern of DF/DHF/DSS outbreaks, all cases were positioned in space and time by addressing the respective villages. Not only is it applicable in an epidemic, but this methodology is general and can be applied in other application fields such as dengue outbreak or other diseases during natural disasters.

Journal ArticleDOI
TL;DR: This paper is an effort to study the effect of mobility models such as Random Way Point, File and Group Mobility Models on the performance of routing protocols using QUALNET simulator and the results show that the choice of Mobility models affect theperformance of routing protocol significantly.
Abstract: Communication in Mobile Ad Hoc Network (MANET) is accomplished using routing protocols. These protocols provide an efficient and reliable path for data sharing. In static environment where the nodes are stationary these protocols performs exceptionally well but in an environment having mobile nodes the performance of these protocols degrade drastically. To investigate this factor various researchers developed mobility models using simulation tools such as QUALNET, NS-2 etc. These models represent the erratic movement of nodes and give us an idea regarding their location, velocity and acceleration change over time. This paper is an effort to study the effect of mobility models such as Random Way Point, File and Group Mobility Models on the performance of routing protocols using QUALNET simulator. The results show that the choice of mobility models affect the performance of routing protocol significantly.

Journal ArticleDOI
TL;DR: This paper will describe the techniques of multi tenancy and how security, flexibility and scalability relate to each other when it comes to multi tenancy for customization.
Abstract: Multi-tenant applications are usually cloud based software services which can serve different users at the same time. This is done using single instance of applications by sharing hardware, infrastructure, data storage and virtualization. To achieve multi tenancy different approaches are there at every layer (Application, Data, hardware).Multi tenancy helps to minimize the effort needed for deployment and maintenance with an adequate level of security and privacy. Now a day the work is going on custom multi tenancy by sharing everything at each layer. This paper will describe the techniques of multi tenancy and how security, flexibility and scalability relate to each other when it comes to multi tenancy for customization.

Journal ArticleDOI
TL;DR: Overall the study suggests that embedding information literacy instruction into the first year, first semester nursing program is beneficial, however, problem solving skills need to be improved.
Abstract: Information literacy has been embedded by the university into the first year nursing curriculum. Embedding this literacy will not necessarily ensure the nursing graduates will apply this skill to the provision of high quality evidence-based health care. For this to happen information literacy skills gained in the classroom must contribute to sound decision making based on best practice evidence. This paper discusses the findings of a three phases research project designed to (i) determine the information literacy skills, confidence and problem solving abilities of students entering the university's Bachelor of Nursing Program; (ii) determine if information literacy skills, confidence and problem solving abilities improve as a result of embedding information literacy instruction into a nursing course; and iii) ascertain whether there are any differences in information literacy skills, confidence and problem solving abilities based on the students demographic information. Data were collected in two sequential semesters using a questionnaire administered to the students. The response rates in semester one and two were 45 and 56 per cent respectively. Student confidence and awareness regarding information literacy is positively affected by learning experiences from semester one to semester two. Students indicated that they need both specific and regular instruction to adequately retain learning. Overall the study suggests that embedding information literacy instruction into the first year, first semester nursing program is beneficial. By the second semester the information literacy confidence and awareness of students increased as a result of intra-curricular instruction, however, problem solving skills need to be improved.

Journal ArticleDOI
TL;DR: In this article, an intelligent system which can separate and classify student according to learning factor and performance is proposed and adaptive fuzzy neural network has less error and can be used as an effective alternative system for classifying students.
Abstract: Identifying exceptional students for scholarships is an essential part of the admissions process in undergraduate and postgraduate institutions, and identifying weak students who are likely to fail is also important for allocating limited tutoring resources. In this article, we have tried to design an intelligent system which can separate and classify student according to learning factor and performance. a system is proposed through Lvq networks methods, anfis method to separate these student on learning factor . In our proposed system, adaptive fuzzy neural network(anfis) has less error and can be used as an effective alternative system for classifying students.

Journal ArticleDOI
TL;DR: Robust Algorithm is presented for frontal face detection in color images, based on Eigen face theory, which automatically detects facial features such as eyes, nose and mouth based on properties of the associated image regions.
Abstract: Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that a face is already located in the given image or the image sequence. Facial features such as eyes, nose and mouth are automatically detected based on properties of the associated image regions. On detecting a mouth, a nose and two eyes, a face verification step based on Eigen face theory is applied to a normalized search space in the image relative to the distance between the eye feature points. The experiments were carried out on test images taken from the internet and various other randomly selected sources. The algorithm has also been tested in practice with a webcam, giving (near) real-time performance and good extraction results.