IJMECS Vol. 6, No. 3, Mar. 2014
Cover page and Table of Contents: PDF (size: 591KB)
In the process of assessing learning outcomes, educators use constructive tools for evaluating students' understanding and performance. In the present study MIS students were engaged in a full life cycle project as part of a Software Analysis and Design workshop. For evaluating their performance, we used the SOLO (Structure of the Observed Learning Outcomes) taxonomy. However during the various stages of the workshop we encountered some inherent limitations of the taxonomy that led us to the understanding that the SOLO taxonomy should be enhanced. This paper elaborates on these missing but required enhancements.[...] Read more.
Neumann-Morgenstern’s solutions NM (v) as stable solution’s optimal principle is stated in a lexicographic v = (v1, v2 ,..., vm)T cooperative game. The conditions of NM (v) existence are proved for the cases, when: 1. v1 scalar cooperative game’s C-core C (v1) and NM (v1)solutions are equal; 2. Scalar cooperative v1 game’s C-core and NM (v1) solutions are different. In the first case the sufficient conditions are proved in order to say that a C-core C (v) of a lexicographic cooperative v game must not be empty and it should be coincided to NM (v) . In the second case the necessary condition of NM (v) existence is proved. In the case of the existence of NM (v) solutions their forms can be established. Some properties NM (v) of solutions are stated.[...] Read more.
A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, then 2D skew tent map is utilized to generate chaotic sequences, which are used for both permutation process and substitution process. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plaintext sensitivity. The substitution process is first initiated with the initial vectors generated by the cipher keys and 2D skew tent map, then the gray values of row and column pixels of 2D image matrix are mixed with the pseudorandom number sequences via bitxoring operation. Both permutation process and substitution process are executed row-by-row and column-by-column instead of pixel-by-pixel to improve the speed of encryption. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption/decryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.[...] Read more.
Flower Pollination algorithm (FPA) is a new nature-inspired algorithm, based on the characteristics of flowering plants.In this paper, a new hybrid optimization method called improved Flower Pollination Algorithm with Chaotic Harmony Search (FPCHS) is proposed. The method combines the standard Flower Pollination algorithm (FPA) with the chaotic Harmony Search (HS) algorithm to improve the searching accuracy. The FPCHS algorithm is used to solve Sudoku puzzles. Numerical results show that the FPCHS is accurate and efficient in comparison with standard Harmony Search, (HS) algorithm.[...] Read more.
This article reviews and analyses the educational research literature on interventions to increase the recruitment and retention of information and communications technology (ICT) students. The results show that three changes in computing pedagogy characterize successful interventions, and consequently offer promising ways to attract and prepare more people for careers in ICT. The most important selection criterion considered when choosing papers to review was that interventions had been tested in practice and their effectiveness measured. Interventions were arranged into two groups: recruitment and retention. Recruitment interventions described initiatives to motivate interest in computing among secondary schools students, whereas retention interventions described efforts to retain students in ICT majors at universities. The three pedagogical approaches that emerged from an analysis of the successful interventions were: (1) visual programming environments to teach introductory programming, (2) inquiry learning activities to engage students in computing, and (3) integration of interdisciplinary knowledge to attract students from diverse disciplines. This review draws attention to innovative teaching practices currently shaping computer science education. Wider adoption of these pedagogical strategies has the potential to significantly increase the number of qualified ICT professionals.[...] Read more.
Agile development reduces the risk of developing low quality software in the first place by minimizing defects. In agile software development formal defect management processes help to build quality software. The core purpose of defect management is to make the software more effective and efficient in order to increase its quality. There are several methods for handling defects like defect prevention, defect discovery and resolution which are used by software developers and testers. Refactoring keeps the system clean by identifying and removing quality defects. To gain the full confidence of the customer defect management should be involved at every stage of development. Agile methodologies focus on delivering the software in form of short iterations. Thus each iteration helps to overcome defects and leads better development and end user satisfaction. This study paints the picture of handling the software defects using agile based Software Development Process.[...] Read more.
Stability, robust and reliability are the main objectives to design a controller for highly nonlinear spherical motor. Most of linear and nonlinear controllers are stable, model-base controllers are reliable but in this group sliding mode controller is a robust controller. Therefore in this research sliding mode controller is used to design stable, robust and reliable controller. For intelligence part, the minimum rule base Proportional Integral Derivative (PID) Fuzzy hybrid guidance Controller for three dimensions spherical motor is presented in this research. Guidance control in a three dimensions spherical motor is performed by the robust sliding mode controllers producing the control signals which are applied to systems torque. Sliding mode controller has an important problem, namely chattering. In this research, chattering-free sliding mode controller is design as a robust guidance controller to their robust performance in a wide range of operating conditions. In this research the PID-like fuzzy controller can be constructed as a parallel structure of a PD-like fuzzy controller and a PI-like controller to have the minimum rule base. Nonlinear type robust sliding mode controller is used to modify PID fuzzy logic theory to design robust and reliable hybrid guidance methodology. This research is used to reduce or eliminate the fuzzy and conventional sliding mode controller problem based on minimum rule base fuzzy logic theory and modified it by sliding mode method to control of spherical motor system.[...] Read more.