In this era of globalization and technological revolution, education is considered as a first step for every human activity. It plays a vital role in the development of human capital and is linked to an individual'...
详细信息
In this era of globalization and technological revolution, education is considered as a first step for every human activity. It plays a vital role in the development of human capital and is linked to an individual's well-being and opportunities for better living. It ensures the acquisition of knowledge and skills that enable individuals to increase their productivity and improve their quality of life. But there are number of factors which deviate student from the actual path resulting in degradation of academic performance. A series of variables is to be considered when to identify the affecting factors towards quality of academic success. Identifying the most contributing variables in the quality of academic performance is a very complex and challenging job. In this proposed work, a fuzzy rule based expert system has been designed to evaluate the performance of students on the basis of various parameters. Firstly, a discussion is held with highly experienced authorities of Lovely Professional University (LPU) with the reason to identify the critical factors that may be affecting students' performance. Five critical factors came into the light namely teaching methodology, university system, university environment, personal reasons and family issues. After that, a one to one formal interaction with engineering students of LPU, is done to identify which kind of factors are affecting particular student. Based upon the collected information, a system is developed which will tell whether the performance of a student will be increased or decreased or remain consistent based on factors provided by the user and counsel him/her against those affecting parameters.
The high voltage circuit breaker is an important power system equipment. The reliability of its running relationship with the safe operation of the entire power system. High voltage circuit breaker on-line monitoring ...
详细信息
Optical Character Recognition (OCR) is one of the most imperative prerequisites of electronic document analysis systems. Segmentation is the preliminary step of OCR, which has long been an active area of research. In ...
详细信息
Optical Character Recognition (OCR) is one of the most imperative prerequisites of electronic document analysis systems. Segmentation is the preliminary step of OCR, which has long been an active area of research. In this paper, we present a hierarchical system towards the segmentation of Bangla script document printed in two different styles viz., italic and bold italic with varying fonts and sizes. At first, the text lines are segmented from the document pages. Next, the words are segmented from the extracted text lines. Finally, the characters are segmented from the extracted word images by using a Trapezoidal Fuzzy membership function, which has been used for the detection of Matra region. The proposed technique is tested on 16 document pages consisting of 1456 words. The average success rates of the technique for text line, word and character segmentation are found to be 99.91%, 98.63% and 89.41% respectively.
One of the basic requirements of Wireless Sensor Network is enhanced network lifetime. Usually Multi-hop communications between sensor nodes and the sink is more energy efficient than single hop communication. However...
详细信息
Data mining is a process of analyzing data from different perspectives and summarizing it into valuable information. It consist of two activities such as clustering and classification. It mainly works with numeric dat...
详细信息
Graphene has attracted much attention since the discovery of its superior carrier-transport-properties. In this paper, we report the intercalation of Cu atoms under a zero layer graphene (ZLG) formed on a SiC(0001) su...
详细信息
Graphene has attracted much attention since the discovery of its superior carrier-transport-properties. In this paper, we report the intercalation of Cu atoms under a zero layer graphene (ZLG) formed on a SiC(0001) substrate, which makes a "free-standing" single layer graphene. Cu atoms are deposited on the ZLG at room temperature. After annealing of the substrate above 600°C, it is conformed by various experimental methods that a single layer graphene is formed as a consequence of the intercalation of Cu atoms between the ZLG and the SiC substrate. A honeycomb lattice corresponding to the graphene with a moireàpattern is observed by scanning tunneling microscopy. A specific linear dispersion at the K point and a characteristic peak in the C1s core level spectrum, which is originated from a free-standing graphene, are demonstrated by angle-resolved photoemission spectroscopy and X-ray photoemission spectroscopy, respectively.
The article proposes one-pass authenticated key establishment protocol in random oracles for Wireless Sensor Networks. Security of the protocol relies on Computational Diffie-Hellman Problem on Bilinear Pairings. In o...
详细信息
The article proposes one-pass authenticated key establishment protocol in random oracles for Wireless Sensor Networks. Security of the protocol relies on Computational Diffie-Hellman Problem on Bilinear Pairings. In one-pass key establishment protocol, the initiator computes a session key and a related message. The key token is to be sent to the intended receiver using receiver's public key and sender secret key. From the received key token the receiver compute the session key, which is the same as the one computed by the sender, using sender public key and receiver's secret key. Because of low communication overhead, the scheme is better suited for Wireless Sensor Networks(WSNs) than the traditional key establishment protocol to establish the session key between two adjacent nodes
Cryptographic applications require several biological techniques and hence they have become more popular recently. In one of the most interesting techniques data is hidden in Deoxyribo Nuclic Acid (DNA). In this paper...
详细信息
Cryptographic applications require several biological techniques and hence they have become more popular recently. In one of the most interesting techniques data is hidden in Deoxyribo Nuclic Acid (DNA). In this paper we have proposed a Data Hiding Insertion Method based upon DNA sequence. In this method we hide information data into DNA sequence randomly using certain techniques. In this method we use several procedures as: random key generation, selection of the succeeding prime number of key value, cumulative XOR operation of key value, selection of look up table index mapping.
The increased popularity of the smart devices among student community has increased the teacher learner communication and taken learning beyond classroom now. The Mobile based Learning (m-learning) gives learner the f...
详细信息
The increased popularity of the smart devices among student community has increased the teacher learner communication and taken learning beyond classroom now. The Mobile based Learning (m-learning) gives learner the flexibility of learning and enables a collaborative learning environment. Involvement, cooperation, team work are the crucial benefits that a student can obtain from the collaborative learning environment. Because of the dynamic nature of m-learning environment, a dynamic self created network or Mobile Ad hoc Network (MANET) would be best suited to establish the collaborative learning environment. Use of MANET in itself raises various issues. For the educational collaboration mobile nodes may frequently exchange data, text, images, transmit audio, video streaming packets to one another or even exchange information from databases thereby causing heavy network traffic. Another important issue to be considered are the malicious attacks-the mobile learning collaborative environment may have to face in absence of centralized authorities and granting access to both legitimate users and attackers. This unconditional trust may not only cause attack on single node, but also on numerous others. Keeping the reputation of participating nodes and to mitigate the attacks against them in the collaborative learning environment has become a challenging issue. This paper will try to jot down these challenges of establishing a Collaborative Learning Environment using the MANET.
Mobile devices are completely heterogonous in respect to hardware and software, thus adaptation of e-learning content is necessary for supporting the contents to get fit into as per the mobile device suitability. Know...
详细信息
Mobile devices are completely heterogonous in respect to hardware and software, thus adaptation of e-learning content is necessary for supporting the contents to get fit into as per the mobile device suitability. Knowing the various attributes and capability information of a mobile device is necessary for proper content adaptation. As there are hundreds of information which can be known about a mobile device, choosing the proper ones are absolutely necessary as per the application requirement. The present paper provides the various techniques by which information regarding a mobile device can be known and the minimum information of which is needed for content adaptation in a mobie based learning or m-learning application in a University Campus scenario with maintaining standards.
暂无评论