About 9610 Results
    Author: Brent Muirhead

    Cognitive psychology offers relevant insights into improving the teaching and learning process. The author has selected ten questions from a graduate class in cognition and learning taken at The Teachers College, Columbia University. The questions will be used to examine the most effective ways to learn and recall information.

    Author: Dr. Mohammad Ali

    The present paper underscores the importance of the cognitive orientation of EFL students in their success in writing courses. A few suggestions are made as to how EFL teachers can put their students on the right cognitive path in their writings.

    Author: Rangaswamy

    Psychology aims at studying the behaviour of individual and group.  Learning includes providing activities and subjects according to the maturity level of the students.  The explosion of information technology has been exercising far reaching influence on the area of educational psychology.  Starting from childhood if psychology of learning is utilized positively it would play a vital role in the building up of a bright career of a child.  Over a period of 50 years about 8400 lakhs of children were enrolled in the elementary schools in India.  So is the responsibility of the teacher to provide subjects according to the maturity level of the students and develop them into better citizens of India.

    Author: Vinita

    Systems thinking plays a key role in producing the understanding of a big picture — a broader view of looking at the overall system needed to develop a learning community more effectively. Practical expectations to improve the functioning of Human systems, here teacher preparedness, on identifying possible interventions, relate at description and partial evaluation of how the systems work. This paper circumscribes linguistic situations and considers individual differences, reluctance for a pedagogical change and administration as interventions in a specific human learning system of importance in education during teacher training. Thereby, an Intervention Solving Protocol [ISP] was addressed to the following problem: How can we improve a learning community of students enrolled in teacher training? In what follows, intervention-solving protocol called ISP explicates the interventions to bring about a transformation to attain the desired state of linguistic education, improved communication and enhanced thinking.

    Author: Muthu

    Problem-based learning (PBL) is a pedagogical method that challenges students to think intuitively, learn co-operatively in groups to seek solutions to real world problems. These problems are used as the building blocks to engage students' curiosity and initiate independent learning of subject matter. Authentic, alternative assessment plays a key role in the effective implementation of a PBL unit. The discussions in this paper are drawn upon the learning experiences of students enrolled in a tertiary institution that has developed its curricular design based upon a rigorous PBL model. Based upon student feedback, some crucial issues focusing on the inherent strengths and pitfalls of authentic assessment techniques in the context of a PBL environment are explored. Students’ comments on possible improvements to the assessment system are also analysed in this paper.

    Author: Flordeliza

    This is a study on the “Personality Characteristics of Polytechnic University of the Philippines (PUP) Sta. Mesa Entrance Scholars from Public and Private High Schools from the Urban and Rural Areas:  A Comparative Study”.   The PUP has been a second home to its students and has been witness to diverse cultures, physiques, and attitudes of students.  Since the university caters to different demographic profiles of students, there are points of distinction that are prevalent.  In order to understand the behavioral patterns of these students, the academe puts premium in research and student development.

    Author: Mahender Reddy Sarsani

    The present study was aimed to assess the teachers’ encouragement in the classroom for the promotion of students’ creativity. A survey method was used for the present research with a sample of 373 subjects from ninth class. For collection of data four instruments were used, namely Student Information Sheet (SIS), two tests of ‘Creative Thinking’ (Verbal and non-verbal) and Teacher Encouragement Scale (TES). The TES was developed specially for this research project. It was designed for the students to rate the extent to which their teachers encouraged creativity in the classroom. The analysis of Teacher Encouragement Scale (TES) showed no significant difference was found for sex and medium of instruction. Students from boys’ schools were more favourable towards the teacher encouragement than girls and coeducation school students. The highly creative students had more favourable attitudes towards teacher encouragement as perceived by students than their counterparts of average and low creative groups. It indicates that level of students’ creativity proportionate to the teacher encouragement.

    Author: Singaravelu

    The present study investigates the learning problems in psychology at Master of Education(M.Ed.,) in Bharathiar University and finds the effectiveness of Discussion Based Fish Bowl Strategy in learning psychology. Single group Experimental method was adopted for the study. Both qualitative and quantitative approaches were adopted for this study. Twenty five students were taken for the study. Discussion Based Fish Bowl Strategy is more effective than conventional approaches in learning psychology.

    Author: J. Harvey

    The paper argues that the above well-proven international experience, be adopted urgently by Indian higher and technical education institutes, so essential for global competitiveness and to win in world competition.

    Author: Kumar

    Technology Management is the capacity of a firm, a group or society to master management of the factors that condition technology change so as to improve its economic, social and cultural environment and wealth. The factors that make up the technological framework are its objective, decision criteria, time, constraints, activities and mechanisms. Technology develops business by providing technical knowledge for the goods and services that the firm produces. Managing technology means using new technology to create competitive advantage, which is quite a difficult job, partly due to differing cultures in a company.

    Technology Assessment is a form of policy research, which provides a balanced appraisal to the policy maker. It is the process of taking a purposeful look at the consequences of technological change. Ideally, it is a system that identifies policy issues assesses the impact of alternative courses of analysis that systematically appraises the nature, significance status and merit of technological progress.

    Technology Forecasting is the totality of the means employs to provide objects necessary for human existence and comfort. This refers to the techniques and procedures to accomplish some desired human processes. The paper gives the deep insights of the technological aspects, its issues related to the forecasting, development, change and adoption of the technology with the Indian economic, social and cultural scenario.

    Author: Jairish Douglas

    'Nanotechnology' is a hybrid science combining engineering, information technology, chemistry and biology. The goal of Nanotechnology is to manipulate atoms individually at nanoscale dimensions. It is not just a miniaturization process but also a 'bottom-up' manufacturing approach of building atoms by atoms using Molecular assemblers. The need of the hour is to build a molecular assembler. Nano-scientists all over the world are advancing towards that direction. Implicit applications of this emerging technology are infinite, ranging from Supercomputing, Raising the dead, Stain-resistant fabrics, Painless surgeries, Ensuring a clean environment etc.

    Author: I.L. Vikentyev

    Here is such a characteristic example. 40 Higher Education students were asked which technical characteristics of a hyperboloid they knew. Each remembered the essence of the mathematical definitions, some even referred to the construction of V.G. Shukhov's tower... but that was all. But the hyperboloid, like any other geometric figure, has a wealth of useful creative applications in technology.

    Author: Sarath B. Siyambalapitiya

    It has been observed that the abilities of mathematics of students entering universities in Sri Lanka are on the decline in recent years. Also there is a school of thought which cultivates the belief that it is sufficient to teach mathematics only as a tool to the extent that it could be used only for certain computations arising in their work. It appears that the teaching of mathematics to engineering students follow this policy in many countries around the world. This paper critically analyses this trend and its repercussions are also discussed in relation to the experience gained at the Faculty of Engineering, University of Peradeniya, Sri lanka.

    Author: Min An

    A great number of the recent changes in engineering design education have been introduced to reflect the need for more engineering applications in engineering degree programmes in UK universities. These changes include final year projects based engineering design education, group projects and industrially supported live projects. These listed changes have brought about many benefits, however they have also raised many new problems. One of these particular problems is how to incorporate the concept of 'design for safety' into engineering design education. This paper presents the development of the incorporated 'design for safety' into engineering design programmes. The described developments are based on a common philosophy, occurred at engineering design programmes in UK universities. The author offers his reflections, from his different perspectives on the implementation of these novel measures, together with pointers to enhance both design education and need of industry in the future. The aim of this paper is to provide a recommendation for developing and improving higher education in engineering design.

    Author: Naganathan

    Autotutor combines a talking head with research in discourse and tutoring dialogs. The most novel is the use of Latent Semantic Analysis (LSA), a statistical technique that can estimate the similarity between two pieces of text. By developing databases of good and bad expected answers, and comparing the similarity of student responses to these expected responses, the tutoring system can produce a type of dialog of human tutors in guiding and correcting students in learning. One of the keys is the system capability to provide the learner with a personalized, adaptive effective teaching. In order to develop such an agent, Autotutor trained a feed-forward, backpropagation neural network to predict the number of errors a student will make. The achieved prediction accuracy is high, showing that a neural network is capable of making such predictions.

    Author: B.V. Babu

    The kinetic behavior of a fixed-bed adsorber can be explained and the characteristic breakthrough curve of the adsorption phenomena can be obtained through mathematical models. In the earlier models, the kinetics is explained using a mathematical model that takes into account of external and internal mass-transfer resistances with a nonideal plug flow behavior. The variation of fluid velocity along the column is an important aspect, which has not been accounted so far. In the present study, a mathematical model is proposed for explaining the kinetic behavior of adsorption phenomena incorporating the fluid velocity variation along the column length also. Internal mass-transfer resistances due to pore diffusion mechanism are considered in the model. The proposed mathematical model for fixed-bed adsorption is solved numerically and compared with earlier model reported in literature. The results show that the breakpoint is obtained earlier which represents the realistic behavior in adsorption phenomena. Initially the sharp front of the breakthrough curve is seen followed by broadening of tail of the breakthrough curve. Simulations are carried out using the present model for a systematic parametric study. The effects of various important and influencing parameters such as flow rate, bed height, inlet adsorbate concentration and particle diameter on breakthrough curve are studied in detail.

    Author: Dr. Sayavur I.

    This paper presents an image processing technique in order to predict the shape of a levitated aspherical droplet. The technique is of great importance to containerless materials processing. A majority of the electromagnetic levitation techniques utilizes two cameras at right angles to observe both transversal and frontal views. This allows obtaining two images of the droplet at instant time. In many cases, the portion of the frontal image is missing due to the heating coil. The newly developed technique allows restoration of the missing portion of the image information. The through image can be reconstructed by combining the recovered shapes. A special computer program is generated to simulate a normalized volume of the droplet.

    Author: Ajith Abraham

    Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, corrupt, damage, destroy or prohibit access to it. Several information security techniques are available today to protect information systems against unauthorized use, duplication, alteration, destruction and virus attacks. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This article presents some of the challenges in designing efficient intrusion detection systems which could provide high accuracy, low false alarm rate and reduced number of features. Finally, we present how some of the computational intelligence paradigms could be used in designing intrusion detection systems in a distributed environment.

    Author: Krishna

    One of the recent developments in telecommunication industry is the introduction of communications through internet. Some of the applications of internet are easy communications, vast library of information at one place, electronic business through internet, e learning modules and so on. As the usage is increasing the problem of privacy and security to data is also increasing. In this context, security to the data comes into picture.

    Anyone designing a product, that will be connected to the internet should be concerned about network security. T &T algorithm is pre-integrated with a wide range of security mechanisms. The broad range of choices makes it easy for the developer to determine the appropriate level of security necessary for their device and deploy it with virtually no impact to their schedules or time to market.

    It is generally agreed that the most powerful tool in providing network security is encryption. In this work, some encryption algorithms are going to be discussed in terms of their code breaking time, computational complexity and response time.

    Author: Sanjay

    Software Testing is perhaps the least-understood and most critical component of the Software Development process in the Software Development Life Cycle (SDLC) with roughly 40-45% cost associated with it. This article explores the importance of a Testing Engineer towards the completion of any successful software project and throws some light on the hurdles that a Testing Engineer encounters and summarizes effective solutions for the same.

    Author: Kumar

    Algorithmic cost modelling uses a mathematical formula to predict project costs based on estimates of the project size, the number of software engineers, and other process and product factors. An algorithmic cost model can be built by analyzing the costs and attributes of completed projects and finding the closest fit formula to actual experience. This paper reflects the use of an algorithmic cost estimation model. We should develop a range of estimates (worst, expected and best) rather than a single estimate and apply the costing formula to all of them. Estimates are most likely to be accurate when we understand the type of software that is being developed, when we have calibrated the costing model using local data, and when programming language and hardware choices are predefined.

    Author: A. Rathika

    This article examines how databases can be integrated into the grid. It also investigates the requirements of grid middleware enabled databases and how the databases can be made available on the grid for access by distributed application. Grid database propose a Service Based Architecture i.e., the database system are wrapped within a Grid enabled service interface that simplifies the task of building applications to access their contents. The paper proposes a framework for federating database servers over the grid, in which service federation middleware connects to the service interfaces of the set of database systems to be federated and creates a “Virtual Database System”. While the paper focuses on federating database system, it also argues that the service based approach will simplify the task of integrating databases with file-based data on the grid where that is required. For example if you need to analyze a lot of data from different computers all over the globe, you could ask the grid to do this. Then the grid could find out where the most convenient source of the data is, without specifying anything and do the analysis on the data wherever it is. The ability to federate data from multiple databases is likely to be a very powerful facility for Grid users wishing to collect and analyze information distributed over the Grid.

    Author: S.J. Wagh

    The ability to categories the packets into flows in an Internet router is termed as Packet Classification. The packets with same source & destination addresses form a flow which follows a predefined rule and are processed in a similar manner. The packet classification is needed for many sophisticated value added services, such as QoS, load balancing, traffic accounting, etc. Various approaches to packet classification have been studied in the literature with accompanying theoretical bound. In this paper, we present an algorithmic framework for solving the packet classification problem practically. We propose and study a novel approach to packet classification using Multistage classifier Compaction Scheme MCS. Besides high performance, our algorithm preserves average search time and reasonable storage requirements. To evaluate our algorithm, we have developed realistic model of large scale rule bases and use them to drive extensive experimentation. The result shows that the algorithm is very efficient as compared to other techniques in real networks.

    Author: Yogendra

    In this paper a computer modeling and simulation of piezoelectric transducer system is explored. A model of a piezoelectric transducer using electrical components such as transmission lines and controlled sources is presented. The advantage gained by using electrical components is that the associated electronics can be designed with great ease. The analogy of wave propagation in acoustic media and transmission lines is described as well as the electrical-mechanical transduction in piezoelectric material. The model is validated by comparing its received signal to that of an actual experiment in the time domain.

    Author: Kalpana

    This paper deals with the analysis of the TCP (Transmission Control Protocol) performance over Mobile Ad Hoc Networks. These networks are assumed with an implementation of a class of non-linear congestion control algorithms called polynomial congestion control algorithms. Two models of these algorithms are introduced in this paper. They generalize the Additive Increase and Multiplicative Decrease (AIMD) algorithms used for the TCP connections. These algorithms provide additive increase using a polynomial of the inverse of the current window size and provide multiplicative decrease using the polynomial of the current window size. There are infinite numbers of TCP-compatible polynomial algorithms by assuming polynomial of different order. This paper compares the performance of the two models for mobile ad hoc TCP networks with the other TCP algorithms. The analysis is based on the simulations. These simulations are performed using ns2, a discrete event network simulator. The effects of varying transmitting antenna power and height are also studied. Effects of signal interference on the proposed models are also studied. The results show that one of the proposed models performs better under various simulated conditions.

Journal on Future Engineering and Technology Journal on Software Engineering Journal on Electrical Engineering Journal on Electronics Engineering Journal of Educational Technology Journal on Educational Psychology Journal on School Educational Technology Journal on English Language Teaching Journal on Mechanical Engineering Journal on Civil Engineering Journal on Embedded Systems Journal on Information Technology Journal on Structural Engineering Journal on Communication Engineering and Systems Journal on Wireless Communication Networks Journal on Instrumentation and Control Engineering Journal on Circuits and Systems Journal on Digital Signal Processing Journal on Power Systems Engineering Journal on Computer Science Journal on Material Science Journal on Cloud Computing Journal on Image Processing Journal on Mobile Applications and Technologies Journal on Pattern Recognition Journal on Mathematics Journal on Management Journal on Nursing Journal on Physical Sciences Journal on Chemical Sciences Journal on Economics & Commerce Journal on Humanities & Social Sciences Journal on Life Sciences Journal on Construction Management Oyla Journal on Data Science & Big Data Analytics Journal on Digital Forensics & Cyber Security Journal on IoT and Smart Automation Journal on Artificial Intelligence & Machine Learning Journal on Augmented & Virtual Reality Journal of the Indian Dental Association Tamil Nadu DALE VIEW'S Journal of Health Sciences and Medical Research DALE VIEW'S Journal of Clinical Pharmacology and Pharmacotherapeutics Journal on Midwifery & Research Journal of Geriatric Nursing Journal on Pediatric Nursing Journal on Critical Care Nursing B-Digest Ponni Nadhi: Journal on Tamil Language & Literature B-Research International Journal of Computing Algorithm International Journal of Web Technology International Journal of Business Intelligent International Journal of Data Mining Techniques and Applications International Journal of Communication and Networking System