IJMECS Vol. 4, No. 7, Jul. 2012
Cover page and Table of Contents: PDF (size: 124KB)
REGULAR PAPERS
This paper aims to explore the factors that impact on rural and remote students’ participation in higher education at university. The findings indicated that the students were familiar only with university scholarships, tertiary preparation program, and head start. Before admission, most students required information on pathways to university, admission requirements, scholarships, and range of courses and after admission they required information on academic support, tutorial assistance, library and IT services. This paper also suggests that universities need to evaluate the effectiveness of the services they offer to both attract and support rural and remote students to University if participation rates are to be raised.
[...] Read more.Motivation has been called the “neglected heart” of language teaching. As teachers, we often forget that all of our learning activities are filtered through our students’ motivation. In this sense, students control the flow of the classroom. Without student motivation, there is no pulse, there is no life in the class. When we learn to incorporate direct approaches to generating student motivation in our teaching, we will become happier and more successful teachers. This paper is an attempt to look at EFL learners’ motivation in learning a foreign language from a theoretical approach. It includes a definition of the concept, the importance of motivation, specific approaches for generating motivation, difference between integrative and instrumental motivation, difference between intrinsic and extrinsic motivation, factors influencing motivation, and adopting motivational teaching practice.
[...] Read more.Elman artificial neural network single and multilayer computerized models were developed for predicting the shelf life of burfi stored at 30ºC. The experimental data of the product relating to moisture, titratable acidity, free fatty acids, tyrosine, and peroxide value were taken as input variables, and overall acceptability score as output variable for developing the models. Bayesian regularization algorithm was applied as training algorithm for neural network. Transfer function for hidden layers was tangent sigmoid; while for output layer it was pure linear function. Elman model with a combination of 5→10→1 and 5→7→7→1 performed exceedingly well for predicting the shelf life of burfi.
[...] Read more.This paper presents a high-speed VLSI fuzzy inference processor for the real-time applications using trapezoid-shaped membership functions. Analysis shows that the matching degree between two trapezoid-shaped membership functions can be obtained without traversing all the elements in the universal disclosure set of all possible conditions. A FPGA based pipelined parallel VLSI architecture has been proposed to take advantage of this basic idea, implemented on CycloneII-EP2C70F896C8. The controller is capable of processing fuzzified input.
The proposed controller is designed for 2-input 1-output with maximum clock rate is 12.96 MHz and 275.33 MHz for 16 and 8 rules respectively. Thus, the inference speed is 0.81 and 34.41 MFLIPS for 16 and 8 rules, respectively.
In the present paper a new combined cryptographic method called Modified UES Version-I has been introduced. Nath et al. have already developed several symmetric key methods. It combines three different methods namely, Generalized Modified Vernam Cipher method, Permutation method and Columnar Transposition method. Nath et al recently developed few efficient combined encryption methods such as TTJSA, DJMNA where they have used generalized MSA method, NJJSAA method and DJSA methods. Each of the methods can be applied independently to encrypt any message. Nath et. al showed that TTJSA and DJMNA is most suitable methods to encrypt password or any small message. The name of this method is Ultra Encryption Standard modified (UES) version-I since it is based on UES version-I developed by Roy et. al. In this method an encryption key pad in Vernam Cipher Method also the feedback has been used which is considered to make the encryption process stronger. Modified UES Version-I may be applied to encrypt data in any office, corporate sectors etc. The method is most suitable to encrypt any type of file such as text, audio, video, image and databases etc.
[...] Read more.Identifying exceptional students for scholarships is an essential part of the admissions process in undergraduate and postgraduate institutions, and identifying weak students who are likely to fail is also important for allocating limited tutoring resources. In this article, we have tried to design an intelligent system which can separate and classify student according to learning factor and performance. a system is proposed through Lvq networks methods, anfis method to separate these student on learning factor . In our proposed system, adaptive fuzzy neural network(anfis) has less error and can be used as an effective alternative system for classifying students.
[...] Read more.In the present paper a new cryptographic method called UES Version-III has been introduced. Nath et al recently developed few efficient encryption methods such as UES version-I, Modified UES-I, UES version-II, TTJSA, DJMNA Nath et. al showed that TTJSA and DJMNA is most suitable methods to encrypt password or any small message. The name of the present method is Ultra Encryption Standard Version-III. It is a Symmetric key Cryptosystem which includes multiple encryption, bit-wise randomization, new advanced bit-wise encryption technique with feedback. In this paper, the authors have performed encryption entirely at the bit-level to achieve greater strength of encryption. In the result section the authors have shown the spectral analysis of encrypted text as well as plain text. The spectral analysis shows that UES-III is free from standard cryptography attack such as brute force attack, known plain text attack and differential attack.
[...] Read more.In order to facilitate communication in Mobile Ad hoc Network (MANET), routing protocols are developed. The performance of these protocols depends upon various factors such as: transmission range, number of nodes deployed and mobility of the nodes. Another factor which affects the performance of MANET routing protocols is the environment in which ad hoc network is deployed. The MANET environment may contain obstacles such as mountains lakes, buildings and river. These obstacles restrict nodes movement but may or may not obstruct the effective transmission range of nodes deployed. This paper is an effort to evaluate the performance of MANET routing protocols in presence of obstacles by designing a simulator in MATLAB-10. To make the situation more realistic obstacle of different shapes, size, number and type were introduced in the simulation region. We found significant impact of the same on the performance of routing protocols.
[...] Read more.