Abstract: Learning Management System (LMS) is the system
which uses to manage the learning in order to grouping the content
and learning activity between the lecturer and learner including
online examination and evaluation. Nowadays, it is the borderless
learning era so the learning activities can be accessed from
everywhere in the world and also anytime via the information
technology and media. The learner can easily access to the
knowledge so the different in time and distance is not a constraint for
learning anymore.
The learning pattern which was used in this research is the
integration of the in-class learning and online learning via internet
and will be able to monitor the progress by the Learning management
system which will create the fast response and accessible learning
process via the social media. In order to increase the capability and
freedom of the learner, the system can show the current and history
of the learning document, video conference and also has the chat
room for the learner and lecturer to interact to each other.
So the objectives of the “The Design and Applied of Learning
Management System via Social Media on Internet: Case Study of
Operating System for Business Subject” are to expand the
opportunity of learning and to increase the efficiency of learning as
well as increase the communication channel between lecturer and
student. The data of this research was collect from 30 users of the
system which are students who enroll in the subject. And the result of
the research is in the “Very Good” which is conformed to the
hypothesis.
Abstract: The implementation of e-assessment as tool to support
the process of teaching and learning in university has become a
popular technological means in universities. E-Assessment provides
many advantages to the users especially the flexibility in teaching and
learning. The e-assessment system has the capability to improve its
quality of delivering education. However, there still exists a
drawback in terms of security which limits the user acceptance of the
online learning system. Even though there are studies providing
solutions for identified security threats in e-learning usage, there is no
particular model which addresses the factors that influences the
acceptance of e-assessment system by lecturers from security
perspective. The aim of this study is to explore security aspects of eassessment
in regard to the acceptance of the technology. As a result
a conceptual model of secure acceptance of e-assessment is proposed.
Both human and security factors are considered in formulation of this
conceptual model. In order to increase understanding of critical issues
related to the subject of this study, interpretive approach involving
convergent mixed method research method is proposed to be used to
execute the research. This study will be useful in providing more
insightful understanding regarding the factors that influence the user
acceptance of e-assessment system from security perspective.
Abstract: The ultrasound imaging is very popular to diagnosis
the disease because of its non-invasive nature. The ultrasound
imaging slowly produces low quality images due to the presence of
spackle noise and wave interferences. There are several algorithms to
be proposed for the segmentation of ultrasound carotid artery images
but it requires a certain limit of user interaction. The pixel in an
image is highly correlated so the spatial information of surrounding
pixels may be considered in the process of image segmentation which
improves the results further. When data is highly correlated, one pixel
may belong to more than one cluster with different degree of
membership. There is an important step to computerize the evaluation
of arterial disease severity using segmentation of carotid artery lumen
in 2D and 3D ultrasonography and in finding vulnerable
atherosclerotic plaques susceptible to rupture which can cause stroke.
Abstract: The planning of geological survey works is an
iterative process which involves planner, geologist, civil engineer and
other stakeholders, who perform different roles and have different
points of view. Traditionally, the team used paper maps or CAD
drawings to present the proposal which is not an efficient way to
present and share idea on the site investigation proposal such as
sitting of borehole location or seismic survey lines. This paper
focuses on how a GIS approach can be utilised to develop a webbased
system to support decision making process in the planning of
geological survey works and also to plan site activities carried out by
Singapore Geological Office (SGO). The authors design a framework
of building an interactive web-based GIS system, and develop a
prototype, which enables the users to obtain rapidly existing
geological information and also to plan interactively borehole
locations and seismic survey lines via a web browser. This prototype
system is used daily by SGO and has shown to be effective in
increasing efficiency and productivity as the time taken in the
planning of geological survey works is shortened. The prototype
system has been developed using the ESRI ArcGIS API 3.7 for Flex
which is based on the ArcGIS 10.2.1 platform.
Abstract: This paper describes the tradeoffs and the design from
scratch of a self-contained, easy-to-use health dashboard software
system that provides customizable data tracking for patients in smart
homes. The system is made up of different software modules and
comprises a front-end and a back-end component. Built with HTML,
CSS, and JavaScript, the front-end allows adding users, logging into
the system, selecting metrics, and specifying health goals. The backend
consists of a NoSQL Mongo database, a Python script, and a
SimpleHTTPServer written in Python. The database stores user
profiles and health data in JSON format. The Python script makes use
of the PyMongo driver library to query the database and displays
formatted data as a daily snapshot of user health metrics against
target goals. Any number of standard and custom metrics can be
added to the system, and corresponding health data can be fed
automatically, via sensor APIs or manually, as text or picture data
files. A real-time METAR request API permits correlating weather
data with patient health, and an advanced query system is
implemented to allow trend analysis of selected health metrics over
custom time intervals. Available on the GitHub repository system,
the project is free to use for academic purposes of learning and
experimenting, or practical purposes by building on it.
Abstract: In this paper, we propose an automatic verification
technology of software patches for user virtual environments on IaaS
Cloud to decrease verification costs of patches. In these days, IaaS
services have been spread and many users can customize virtual
machines on IaaS Cloud like their own private servers. Regarding to
software patches of OS or middleware installed on virtual machines,
users need to adopt and verify these patches by themselves. This task
increases operation costs of users. Our proposed method replicates
user virtual environments, extracts verification test cases for user
virtual environments from test case DB, distributes patches to virtual
machines on replicated environments and conducts those test cases
automatically on replicated environments. We have implemented the
proposed method on OpenStack using Jenkins and confirmed the
feasibility. Using the implementation, we confirmed the effectiveness
of test case creation efforts by our proposed idea of 2-tier abstraction
of software functions and test cases. We also evaluated the automatic
verification performance of environment replications, test cases
extractions and test cases conductions.
Abstract: A large amount of data is typically stored in relational
databases (DB). The latter can efficiently handle user queries which
intend to elicit the appropriate information from data sources.
However, direct access and use of this data requires the end users to
have an adequate technical background, while they should also cope
with the internal data structure and values presented. Consequently
the information retrieval is a quite difficult process even for IT or DB
experts, taking into account the limited contributions of relational
databases from the conceptual point of view. Ontologies enable users
to formally describe a domain of knowledge in terms of concepts and
relations among them and hence they can be used for unambiguously
specifying the information captured by the relational database.
However, accessing information residing in a database using
ontologies is feasible, provided that the users are keen on using
semantic web technologies. For enabling users form different
disciplines to retrieve the appropriate data, the design of a Graphical
User Interface is necessary. In this work, we will present an
interactive, ontology-based, semantically enable web tool that can be
used for information retrieval purposes. The tool is totally based on
the ontological representation of underlying database schema while it
provides a user friendly environment through which the users can
graphically form and execute their queries.
Abstract: Every machine plays roles of client and server
simultaneously in a peer-to-peer (P2P) network. Though a P2P
network has many advantages over traditional client-server models
regarding efficiency and fault-tolerance, it also faces additional
security threats. Users/IT administrators should be aware of risks
from malicious code propagation, downloaded content legality, and
P2P software’s vulnerabilities. Security and preventative measures
are a must to protect networks from potential sensitive information
leakage and security breaches. Bit Torrent is a popular and scalable
P2P file distribution mechanism which successfully distributes large
files quickly and efficiently without problems for origin server. Bit
Torrent achieved excellent upload utilization according to
measurement studies, but it also raised many questions as regards
utilization in settings, than those measuring, fairness, and Bit
Torrent’s mechanisms choice. This work proposed a block selection
technique using Fuzzy ACO with optimal rules selected using ACO.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: Graphical User Interface (GUI) is essential to
programming, as is any other characteristic or feature, due to the fact
that GUI components provide the fundamental interaction between
the user and the program. Thus, we must give more interest to GUI
during building and development of systems. Also, we must give a
greater attention to the user who is the basic corner in the dealing
with the GUI. This paper introduces an approach for designing GUI
from one of the models of business workflows which describe the
workflow behavior of a system, specifically through Activity
Diagrams (AD).
Abstract: The legends about “user-friendly” and “easy-to-use”
birotical tools (computer-related office tools) have been spreading
and misleading end-users. This approach has led us to the extremely
high number of incorrect documents, causing serious financial losses
in the creating, modifying, and retrieving processes. Our research
proved that there are at least two sources of this underachievement:
(1) The lack of the definition of the correctly edited, formatted
documents. Consequently, end-users do not know whether their
methods and results are correct or not. They are not aware of their
ignorance. They are so ignorant that their ignorance does not allow
them to realize their lack of knowledge. (2) The end-users’ problem
solving methods. We have found that in non-traditional programming
environments end-users apply, almost exclusively, surface approach
metacognitive methods to carry out their computer related activities,
which are proved less effective than deep approach methods.
Based on these findings we have developed deep approach
methods which are based on and adapted from traditional
programming languages. In this study, we focus on the most popular
type of birotical documents, the text based documents. We have
provided the definition of the correctly edited text, and based on this
definition, adapted the debugging method known in programming.
According to the method, before the realization of text editing, a
thorough debugging of already existing texts and the categorization
of errors are carried out. With this method in advance to real text
editing users learn the requirements of text based documents and also
of the correctly formatted text.
The method has been proved much more effective than the
previously applied surface approach methods. The advantages of the
method are that the real text handling requires much less human and
computer sources than clicking aimlessly in the GUI (Graphical User
Interface), and the data retrieval is much more effective than from
error-prone documents.
Abstract: Currently, there is excessively growing information
about places on Facebook, which is the largest social network but
such information is not explicitly organized and ranked. Therefore
users cannot exploit such data to recommend places conveniently and
quickly. This paper proposes a Facebook application and an Android
application that recommend places based on the number of check-ins
of those places, the distance of those places from the current location,
the number of people who like Facebook page of those places, and
the number of talking about of those places. Related Facebook data is
gathered via Facebook API requests. The experimental results of the
developed applications show that the applications can recommend
places and rank interesting places from the most to the least. We have
found that the average satisfied score of the proposed Facebook
application is 4.8 out of 5. The users’ satisfaction can increase by
adding the app features that support personalization in terms of
interests and preferences.
Abstract: Stator elements «Vane diffuser + crossover + return
channel» of stages with different specific speed were investigated by
CFD calculations. The regime parameter was introduced to present
efficiency and loss coefficient performance of all elements together.
Flow structure demonstrated advantages and disadvantages of design.
Flow separation in crossovers was eliminated by its shape
modification. Efficiency increased visibly. Calculated CFD
performances are in acceptable correlation with predicted ones by
engineering design method. The information obtained is useful for
design method better calibration.
Abstract: The emerging Cognitive Radio is combo of both the
technologies i.e. Radio dynamics and software technology. It involve
wireless system with efficient coding, designing, and making them
artificial intelligent to take the decision according to the surrounding
environment and adopt themselves accordingly, so as to deliver the
best QoS. This is the breakthrough from fixed hardware and fixed
utilization of the spectrum. This software-defined approach of
research is centralized at user-definition and application driven
model, various software method are used for the optimization of the
wireless communication. This paper focused on the Spectrum
allocation technique using genetic algorithm GA to evolve radio,
represented by chromosomes. The chromosomes gene represents the
adjustable parameters in given radio and by using GA, evolving over
the generations, the optimized set of parameters are evolved, as per
the requirement of user and availability of the spectrum, in our
prototype the gene consist of 6 different parameters, and the best set
of parameters are evolved according to the application need and
availability of the spectrum holes and thus maintaining best QoS for
user, simultaneously maintaining licensed user rights. The analyzing
tool Matlab is used for the performance of the prototype.
Abstract: Fast changing knowledge systems on the Internet can
be accessed more efficiently with the help of automatic document
summarization and updating techniques. The aim of multi-document
update summary generation is to construct a summary unfolding the
mainstream of data from a collection of documents based on the
hypothesis that the user has already read a set of previous documents.
In order to provide a lot of semantic information from the documents,
deeper linguistic or semantic analysis of the source documents were
used instead of relying only on document word frequencies to select
important concepts. In order to produce a responsive summary,
meaning oriented structural analysis is needed. To address this issue,
the proposed system presents a document summarization approach
based on sentence annotation with aspects, prepositions and named
entities. Semantic element extraction strategy is used to select
important concepts from documents which are used to generate
enhanced semantic summary.
Abstract: Clustering involves the partitioning of n objects into k
clusters. Many clustering algorithms use hard-partitioning techniques
where each object is assigned to one cluster. In this paper we propose
an overlapping algorithm MCOKE which allows objects to belong to
one or more clusters. The algorithm is different from fuzzy clustering
techniques because objects that overlap are assigned a membership
value of 1 (one) as opposed to a fuzzy membership degree. The
algorithm is also different from other overlapping algorithms that
require a similarity threshold be defined a priori which can be
difficult to determine by novice users.
Abstract: Image search engines rely on the surrounding textual
keywords for the retrieval of images. It is a tedious work for the
search engines like Google and Bing to interpret the user’s search
intention and to provide the desired results. The recent researches
also state that the Google image search engines do not work well on
all the images. Consequently, this leads to the emergence of efficient
image retrieval technique, which interprets the user’s search intention
and shows the desired results. In order to accomplish this task, an
efficient image re-ranking framework is required. Sequentially, to
provide best image retrieval, the new image re-ranking framework is
experimented in this paper. The implemented new image re-ranking
framework provides best image retrieval from the image dataset by
making use of re-ranking of retrieved images that is based on the
user’s desired images. This is experimented in two sections. One is
offline section and other is online section. In offline section, the reranking
framework studies differently (reference classes or Semantic
Spaces) for diverse user query keywords. The semantic signatures get
generated by combining the textual and visual features of the images.
In the online section, images are re-ranked by comparing the
semantic signatures that are obtained from the reference classes with
the user specified image query keywords. This re-ranking
methodology will increases the retrieval image efficiency and the
result will be effective to the user.
Abstract: Parameters of flow are calculated in vaneless diffusers
with relative width 0,014–0,10. Inlet angles of flow and similarity
criteria were varied. There is information on flow separation,
boundary layer development, configuration of streamlines.
Polytrophic efficiency, loss coefficient and recovery coefficient are
used to compare effectiveness of diffusers. The sample of
optimization of narrow diffuser with conical walls is presented. Three
wide diffusers with narrowing walls are compared. The work is made
in the R&D laboratory “Gas dynamics of turbo machines” of the TU
SPb.
Abstract: Universal modeling method well proven for industrial
compressors was applied for design of the high flow rate supersonic
stage. Results were checked by ANSYS CFX and NUMECA Fine
Turbo calculations. The impeller appeared to be very effective at
transonic flow velocities. Stator elements efficiency is acceptable at
design Mach numbers too. Their loss coefficient versus inlet flow
angle performances correlates well with Universal modeling
prediction. The impeller demonstrates ability of satisfactory operation
at design flow rate. Supersonic flow behavior in the impeller inducer
at the shroud blade to blade surface Φ des deserves additional study.
Abstract: Conventional educational practices, do not offer all
the required skills for teachers to successfully survive in today’s
workplace. Due to poor professional training, a big gap exists across
the curriculum plan and the teacher practices in the classroom. As
such, raising the quality of teaching through ICT-enabled training and
professional development of teachers should be an urgent priority.
‘Mobile Learning’, in that vein, is an increasingly growing field of
educational research and practice across schools and work places. In
this paper, we propose a novel Mobile learning system that allows the
users to learn through an intelligent mobile learning in cooperatively
every-time and every-where. The system will reduce the training cost
and increase consistency, efficiency, and data reliability. To establish
that our system will display neither functional nor performance
failure, the evaluation strategy is based on formal observation of
users interacting with system followed by questionnaires and
structured interviews.