A web-based working memory (WM) test system is a management system website that allows students to test their ability
and skills in remembering visual patterns. It also enables you to record and store the data for individuals. The system is developed
using HTML, PHP and MySQL as a database system to manage and store the data. The system targets several users: children and
adults who suffer from attention deficit or learning problems. The main objectives for developing the website are to educate the
community on the benefits of performing the working memory test of the activity of the brain and improvements in social skills and improving poor academic and professional performance, especially in maths and reading comprehension. This study implements a set of tasks, testing 59 adults aged 18-24 years of age at King Abdul-Aziz University for testing and measuring WM and cognitive
abilities. Results showed tests depended on the age entry by the user. The implications of the test results will help people know their WM level before ascertaining the appropriate suggestions, and to make the test suit our society.
Understanding Working Memory for Improving LearningEditor IJCATR
A web-based working memory (WM) test system is a management system website that allows students to test their ability
and skills in remembering visual patterns. It also enables you to record and store the data for individuals. The system is developed
using HTML, PHP and MySQL as a database system to manage and store the data. The system targets several users: children and
adults who suffer from attention deficit or learning problems. The main objectives for developing the website are to educate the
community on the benefits of performing the working memory test of the activity of the brain and improvements in social skills and
improving poor academic and professional performance, especially in maths and reading comprehension. This study implements a set
of tasks, testing 59 adults aged 18-24 years of age at King Abdul-Aziz University for testing and measuring WM and cognitive
abilities. Results showed tests depended on the age entry by the user. The implications of the test results will help people know their
WM level before ascertaining the appropriate suggestions, and to make the test suit our society.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cognitive Load Persuade Attribute for Special Need Education System Using Dat...ijdmtaiir
Human learning system is highly sensitive to
responsive system according the processing, mapping, motion,
auditory and visualization system. Special education system is
implemented to overcome the demanded sense of the human
special care sensitive signals. This responsive system is
balanced and effectively instrumented with modern
technological learning pedagogy to bring the special need
learners into the normal learning system. In the learning
process, cognitive human sensors directly influence the
learning effectiveness. This paper attempted to observe the
cognitive load such as mental , physical , temporal
,performance , effort and frustration in the long term , short
term, working , instant , responsive, process, recollect ,
reference , instruction and action memory and classify the
observed values as per the generalized and specialized
properties. The six working loads are observed in the ten types
of learning system. The classification analysis aimed to
predicate the pattern for learning system for specific learning
challenges.
Adaboost-multilayer perceptron to predict the student’s performance in softwa...journalBEEI
Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
Understanding Working Memory for Improving LearningEditor IJCATR
A web-based working memory (WM) test system is a management system website that allows students to test their ability
and skills in remembering visual patterns. It also enables you to record and store the data for individuals. The system is developed
using HTML, PHP and MySQL as a database system to manage and store the data. The system targets several users: children and
adults who suffer from attention deficit or learning problems. The main objectives for developing the website are to educate the
community on the benefits of performing the working memory test of the activity of the brain and improvements in social skills and
improving poor academic and professional performance, especially in maths and reading comprehension. This study implements a set
of tasks, testing 59 adults aged 18-24 years of age at King Abdul-Aziz University for testing and measuring WM and cognitive
abilities. Results showed tests depended on the age entry by the user. The implications of the test results will help people know their
WM level before ascertaining the appropriate suggestions, and to make the test suit our society.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cognitive Load Persuade Attribute for Special Need Education System Using Dat...ijdmtaiir
Human learning system is highly sensitive to
responsive system according the processing, mapping, motion,
auditory and visualization system. Special education system is
implemented to overcome the demanded sense of the human
special care sensitive signals. This responsive system is
balanced and effectively instrumented with modern
technological learning pedagogy to bring the special need
learners into the normal learning system. In the learning
process, cognitive human sensors directly influence the
learning effectiveness. This paper attempted to observe the
cognitive load such as mental , physical , temporal
,performance , effort and frustration in the long term , short
term, working , instant , responsive, process, recollect ,
reference , instruction and action memory and classify the
observed values as per the generalized and specialized
properties. The six working loads are observed in the ten types
of learning system. The classification analysis aimed to
predicate the pattern for learning system for specific learning
challenges.
Adaboost-multilayer perceptron to predict the student’s performance in softwa...journalBEEI
Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
Android and iOS Hybrid Applications for Surabaya Public Transportation Route Editor IJCATR
This study is conducted to address the lack of route information of public transportation in Surabaya by creating an online guide that can be accessed by passengers to get complete information on maps and travel routes for public transportation. This guide is made interactive, simple, accessible and appropriate for transport adapted to the conditions in the city of Surabaya. This research will develop an Android and iOS applications that can be used on smartphones and tablets using Android and iOS operating systems. Maps and routes are obtained from the Department of Transportation of Surabaya. A survey was done by distributing questionnaires to determine the passengers’ need for public transportation. Maps and route are developed using OpenStreetMap, Ajax, Javascript, XML, OpenLayer, PostgreSQL, and PostGIS. The hybrid application is compiled using PhoneGap. Passengers simply point to the destination of their journey, such as the name of the street or landmarks and public places. The system will automatically choose the alternative lyn of bemo they should choose, including the routes to reach the destination. The information includes the connecting line of a public minibus (called bemo in Indonesian) if the route needs to be connected by more than one bemo line. The information also includes the fare to be paid. From the test results, both the Android and iOS applications can adapt to a wide range of smartphones with a variety of screen sizes, from 3.5 inch to 5 inch smartphones and 7 inch tablets
The Statement of Conjunctive and Disjunctive Queries in Object Oriented Datab...Editor IJCATR
Entrance of object orienting concept in database caused the relation database gradually to replace with object oriented
database in various fields. On the other hand for solving the problem of real world uncertain data, several methods were presented.
One of these methods for modeling database is an approach wich couples object-oriented database modeling with fuzzy logic. Many
queries that users to pose are expressed on the basis of linguistic variables. Because of classical databases are not able to support these
variables, leads to fuzzy approaches are considered. We investigate databases queries in this study both simple and complex ways. In
the complex way, we use conjunctive and disjunctive queries. In the following, we use the XML labels to express inqueries into fuzzy.
We can also communicate with other sections of software by entering into XML world as the most reliable opportunity. Also we want
to correct conjunctive and disjunctive queries related to fuzzy object oriented database using the concept of dependency measure and
weight, and weight be assigned to different phrases of a query based on user emphasis. The other aim of this research is mapping fuzzy
queries to fuzzy-XML. It is expected to be simple implement of query, and output of execution of queries be greatly closer to users'
needs and fulfill her expect. The results show that the proposed method explains the possible conjunctive and disjunctive queries the
database in the form of Fuzzy-XML.
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies
Impacts of Object Oriented Programming on Web Application DevelopmentEditor IJCATR
Development of web application nowadays can hardly survive without object oriented approach except for the purpose of just information display. The complexity of application development and the need for content organization has raised the need for web application developers to embrace object oriented programming approach. This paper exposes the impact of object oriented programming on web application development. The exposition was done through a detailed study and analysis of information from secondary sources. The internet was usefully employed to access journal articles for both national and international sources. Our study enables web developers and designers to understand web application features, tools and methodologies for developing web application. It also keeps researchers and scholars abreast of the boost which OOP has brought into Web Applications development.
Enhancing Data Staging as a Mechanism for Fast Data AccessEditor IJCATR
Most organizations rely on data in their daily transactions and operations. This data is retrieved from different source systems in a distributed network hence it comes in varying data types and formats. The source data is prepared and cleaned by subjecting it to algorithms and functions before transferring it to the target systems which takes more time. Moreover, there is pressure from data users within the data warehouse for data to be availed quickly for them to make appropriate decisions and forecasts. This has not been the case due to immense data explosion in millions of transactions resulting from business processes of the organizations. The current legacy systems cannot handle large data levels due to processing capabilities and customizations. This approach has failed because there lacks clear procedures to decide which data to collect or exempt. It is with this concern that performance degradation should be addressed because organizations invest a lot of resources to establish a functioning data warehouse. Data staging is a technological innovation within data warehouses where data manipulations are carried out before transfer to target systems. It carries out data integration by harmonizing the staging functions, cleansing, verification, and archiving source data. Deterministic Prioritization Approach will be employed to enhance data staging, and to clearly prove this change Experiment design is needed to test scenarios in the study. Previous studies in this field have mainly focused in the data warehouses processes as a whole but less to the specifics of data staging area.
A Review of Data Access Optimization Techniques in a Distributed Database Man...Editor IJCATR
In today's computing world, accessing and managing data has become one of the most significant elements. Applications as
varied as weather satellite feedback to military operation details employ huge databases that store graphics images, texts and other
forms of data. The main concern in maintaining this information is to access them in an efficient manner. Database optimization
techniques have been derived to address this issue that may otherwise limit the performance of a database to an extent of vulnerability.
We therefore discuss the aspects of performance optimization related to data access in distributed databases. We further looked at the
effect of these optimization techniques.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Decision support system is an interactive system to support decision-making process through the alternatives derived from
the processing of data, information and design models. In this research will build a decision support system modeling for the
determination of admission scholarship, as long as this problem of determining admission scholarship often become obstacles in
distribution and is not directed at the destination as expected. Therefore, in order to give a better result and overcome obstacles in the
distribution of scholarships. The problems of determining admission scholarship will be resolved through Fuzzy approach to the Analytic Hierarchy Process (AHP) is modeled in a decision support system modeling. Where Fuzzy will perform the functions of representation based membership in the assessment criteria. So the results given Fuzzy will be approached with the weight vector
given by the Analytic Hierarchy Process (AHP) which would then be carried out by the ranking process Analiytic Hierarchy Process (AHP) to determine the best alternative will be selected as scholarship recipients. After Fuzzy AHP approach in modeling decision support systems, particularly in the determination of admission scholarships and given very good results and focus on the goal as expected.
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies.
Calculation of Leakage Water and Forecast Actual Water Delivery in Town Drink...Editor IJCATR
Almost all proposals present forecast data of the variables in focus and conclude the results. However, some variables such
as water can change its volume during the traverse from source to end. Such of these variables need to be studied with loss parameters
also. This loss parameter here is leakage water. Water demand forecast can be calculated for the coming years, but leakage water also
need to be calculated and then actually delivered water to the end users has to be forecast. This paper proposed a model of piping
pattern, leakage locations. Calculated leakage water and forecast the actual delivery of water to end users. On the application side, the
results of this paper help administrators take decisions on improving infrastructure of water distributions system and take precautions
to care the maintenance of the infrastructure. The ideas and methods presented in this paper can be applied to other projects of similar
nature. On the academic research side, this formulation helps further in-depth analysis to be carried out to calculate exact leakage
water volumes. Water works departments can also benefit from this research.
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
Digital Watermark is class of marker or symbol secretly embedded in a multimedia signal such as Audio, Image or Video. It
is used to identify the ownership of the multimedia signal. Video watermarking is an emerging area for various applications like copy
control broadcast monitoring, video authentication, copyright protection and enhanced video coding. The main objective of this paper
is to present survey and comparisons of various available techniques on video watermarking based on copyright protection and
identification. Comparative study of various technologies gives the significant information about the PSNR, payload, quality factor
and also the various attacks used in video watermarking techniques. The best techniques in various scenarios are discussed in this
paper which will help the research scholars in field of video watermarking.
Effects of Supply Chain Management Practices On The Performance Of Banks In K...Editor IJCATR
The paper examines the adoption of the Supply Chain Management practices on the performance
of Banks in Kenya. This research conceptualizes and develops four dimensions of SCM practice
(outsourcing of goods & services, information & communication technology, strategic supplier
partnership, and globalization) and tests the relationships between SCM practices, and
organizational performance. The study employed descriptive design. Data for the study was
collected using a self-administered questionnaire procedure, where the questionnaires were
administered to the selected respondents through drop and pick later technique. A sample size of
33 respondents was drawn from the sample frame using simple stratified random sampling
technique to promote the needs for efficiency and representativeness from various branches and
outlets of Postbank as an organization in Nairobi County and the relationships proposed in the
framework was tested using Chi-square, T-test among other statistical tools. Data was analyzed
by aid of Statistical Package for Social Sciences (SPSS). The study will be useful in the academic
circles as it will contribute immensely towards filling the gaps in knowledge in the area of service
industry. The study found that outsourcing was important to the banks only when the appropriate
methods are employed. It also found that ICT had a major role in determining the performance of
banks as it dictated the mode of transaction and data they displayed to clients. Strategic
partnership was also important based on what it intended to achieve in enhancing the performance
of banks. Lastly, globalization is equally vital as it increases competition and exposes local banks
to global scene to experience how performance of banks can be improved. The study recommends
that correct ICT methods should be applied to promote the competitiveness of banks and improve
performance. Also it recommends that outsourcing be done only if they promote the objectives and
goals of the banking institute.
Identifying Gender from Facial Parts Using Support Vector Machine ClassifierEditor IJCATR
Gender classification can be stated as inferring female or male from a collection of facial images. There exist different
methods for gender classification, such as gait, iris, hand shape and hair, it is probably better way to find out gender based on facial
features. In this paper SVM basic kernel function has been employed firstly to detect and classify the human gender Image into
two labels i.e. (1) male and (2) female. The gender classifier achieves over 96% accuracy.
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
A Review of Storage Specific Solutions for Providing Quality of Service in St...Editor IJCATR
Predictable storage performance is a vital requirement for promising performance of the applications utilizing it and it is the
systems administrators’ job to ensure that storage performance meets the requirements of the applications. Most storage solutions are
able to virtualize the amount of storage presented to the host in a flexible way, but the same storage devices have no QOS features
.Storage level agreements provided by storage devices do not provide predictability in service delivery due to the absence of
prioritization (QOS) mechanisms in storage devices. This paper reviews some of the storage specific solutions developed to implement
quality of service in storage area networks.
ORIGINAL RESEARCHpublished 10 November 2015doi 10.3389.docxalfred4lewis58146
ORIGINAL RESEARCH
published: 10 November 2015
doi: 10.3389/fpsyg.2015.01711
Edited by:
Jesus De La Fuente,
University of Almería, Spain
Reviewed by:
Marian Berryhill,
University of Nevada, Reno, USA
Ana Miranda,
Universidad de Valencia, Spain
*Correspondence:
Stina Söderqvist
[email protected]
Specialty section:
This article was submitted to
Educational Psychology,
a section of the journal
Frontiers in Psychology
Received: 01 July 2015
Accepted: 23 October 2015
Published: 10 November 2015
Citation:
Söderqvist S and Bergman Nutley S
(2015) Working Memory Training
is Associated with Long Term
Attainments in Math and Reading.
Front. Psychol. 6:1711.
doi: 10.3389/fpsyg.2015.01711
Working Memory Training is
Associated with Long Term
Attainments in Math and Reading
Stina Söderqvist* and Sissela Bergman Nutley
Clinical Research, Pearson Clinical Assessment, Stockholm, Sweden
Training working memory (WM) using computerized programs has been shown to
improve functions directly linked to WM such as following instructions and attention.
These functions influence academic performance, which leads to the question of
whether WM training can transfer to improved academic performance. We followed
the academic performance of two age-matched groups during 2 years. As part of the
curriculum in grade 4 (age 9–10), all students in one classroom (n = 20) completed
Cogmed Working Memory Training (CWMT) whereas children in the other classroom
(n = 22) received education as usual. Performance on nationally standardized tests in
math and reading was used as outcome measures at baseline and two years later. At
baseline both classes were normal/high performing according to national standards. At
grade 6, reading had improved to a significantly greater extent for the training group
compared to the control group (medium effect size, Cohen’s d = 0.66, p = 0.045).
For math performance the same pattern was observed with a medium effect size
(Cohen’s d = 0.58) reaching statistical trend levels (p = 0.091). Moreover, the academic
attainments were found to correlate with the degree of improvements during training
(p < 0.053). This is the first study of long-term (>1 year) effects of WM training
on academic performance. We found performance on both reading and math to be
positively impacted after completion of CWMT. Since there were no baseline differences
between the groups, the results may reflect an influence on learning capacity, with
improved WM leading to a boost in students’ capacity to learn. This study is also the first
to investigate the effects of CWMT on academic performance in typical or high achieving
students. The results suggest that WM training can help optimize the academic potential
of high performers.
Keywords: working memory training, academic attainment, cognitive training, cogmed, educational psychology
INTRODUCTION
Working memory (WM) refers to the ability to keep information in mind and work with this
information. WM has a limited ca.
A powerpoint presentation of my research paper for Advanced General Psychology on "The Application of Technology to Improve Learning and Retention."
Abstract - Human learning system is highly sensitive to responsive system according the processing, mapping, motion, auditory and visualization system. Special education system is implemented to overcome the demanded sense of the human special care sensitive signals. This responsive system is balanced and effectively instrumented with modern technological learning pedagogy to bring the special need learners into the normal learning system. In the learning process, cognitive human sensors directly influence the learning effectiveness. This paper attempted to observe the cognitive load such as mental , physical , temporal ,performance , effort and frustration in the long term , short term, working , instant , responsive, process, recollect , reference , instruction and action memory and classify the observed values as per the generalized and specialized properties. The six working loads are observed in the ten types of learning system. The classification analysis aimed to predicate the pattern for learning system for specific learning challenges.
In human-computer interaction, there are
a number of design factors that designers keep in mind
while designing the user interfaces to make user
experiences easy and less painful. Affordance is one
of that and it plays a critical role in this experience.
These are the self-explanatory signs that offer the user
how an object or a system can be utilized without
making any efforts. In this research paper, we focused
and experimentally examined how affordance-based
interactions can affect the cognitive load of children's
memory. We provided the children whose ages were
between 7 to 12 years with the simple task to identify
the positions of different objects using a mental
education brain game after distracting them with a
short movie clip and observed the findings which we
will discuss in detail later.
Android and iOS Hybrid Applications for Surabaya Public Transportation Route Editor IJCATR
This study is conducted to address the lack of route information of public transportation in Surabaya by creating an online guide that can be accessed by passengers to get complete information on maps and travel routes for public transportation. This guide is made interactive, simple, accessible and appropriate for transport adapted to the conditions in the city of Surabaya. This research will develop an Android and iOS applications that can be used on smartphones and tablets using Android and iOS operating systems. Maps and routes are obtained from the Department of Transportation of Surabaya. A survey was done by distributing questionnaires to determine the passengers’ need for public transportation. Maps and route are developed using OpenStreetMap, Ajax, Javascript, XML, OpenLayer, PostgreSQL, and PostGIS. The hybrid application is compiled using PhoneGap. Passengers simply point to the destination of their journey, such as the name of the street or landmarks and public places. The system will automatically choose the alternative lyn of bemo they should choose, including the routes to reach the destination. The information includes the connecting line of a public minibus (called bemo in Indonesian) if the route needs to be connected by more than one bemo line. The information also includes the fare to be paid. From the test results, both the Android and iOS applications can adapt to a wide range of smartphones with a variety of screen sizes, from 3.5 inch to 5 inch smartphones and 7 inch tablets
The Statement of Conjunctive and Disjunctive Queries in Object Oriented Datab...Editor IJCATR
Entrance of object orienting concept in database caused the relation database gradually to replace with object oriented
database in various fields. On the other hand for solving the problem of real world uncertain data, several methods were presented.
One of these methods for modeling database is an approach wich couples object-oriented database modeling with fuzzy logic. Many
queries that users to pose are expressed on the basis of linguistic variables. Because of classical databases are not able to support these
variables, leads to fuzzy approaches are considered. We investigate databases queries in this study both simple and complex ways. In
the complex way, we use conjunctive and disjunctive queries. In the following, we use the XML labels to express inqueries into fuzzy.
We can also communicate with other sections of software by entering into XML world as the most reliable opportunity. Also we want
to correct conjunctive and disjunctive queries related to fuzzy object oriented database using the concept of dependency measure and
weight, and weight be assigned to different phrases of a query based on user emphasis. The other aim of this research is mapping fuzzy
queries to fuzzy-XML. It is expected to be simple implement of query, and output of execution of queries be greatly closer to users'
needs and fulfill her expect. The results show that the proposed method explains the possible conjunctive and disjunctive queries the
database in the form of Fuzzy-XML.
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies
Impacts of Object Oriented Programming on Web Application DevelopmentEditor IJCATR
Development of web application nowadays can hardly survive without object oriented approach except for the purpose of just information display. The complexity of application development and the need for content organization has raised the need for web application developers to embrace object oriented programming approach. This paper exposes the impact of object oriented programming on web application development. The exposition was done through a detailed study and analysis of information from secondary sources. The internet was usefully employed to access journal articles for both national and international sources. Our study enables web developers and designers to understand web application features, tools and methodologies for developing web application. It also keeps researchers and scholars abreast of the boost which OOP has brought into Web Applications development.
Enhancing Data Staging as a Mechanism for Fast Data AccessEditor IJCATR
Most organizations rely on data in their daily transactions and operations. This data is retrieved from different source systems in a distributed network hence it comes in varying data types and formats. The source data is prepared and cleaned by subjecting it to algorithms and functions before transferring it to the target systems which takes more time. Moreover, there is pressure from data users within the data warehouse for data to be availed quickly for them to make appropriate decisions and forecasts. This has not been the case due to immense data explosion in millions of transactions resulting from business processes of the organizations. The current legacy systems cannot handle large data levels due to processing capabilities and customizations. This approach has failed because there lacks clear procedures to decide which data to collect or exempt. It is with this concern that performance degradation should be addressed because organizations invest a lot of resources to establish a functioning data warehouse. Data staging is a technological innovation within data warehouses where data manipulations are carried out before transfer to target systems. It carries out data integration by harmonizing the staging functions, cleansing, verification, and archiving source data. Deterministic Prioritization Approach will be employed to enhance data staging, and to clearly prove this change Experiment design is needed to test scenarios in the study. Previous studies in this field have mainly focused in the data warehouses processes as a whole but less to the specifics of data staging area.
A Review of Data Access Optimization Techniques in a Distributed Database Man...Editor IJCATR
In today's computing world, accessing and managing data has become one of the most significant elements. Applications as
varied as weather satellite feedback to military operation details employ huge databases that store graphics images, texts and other
forms of data. The main concern in maintaining this information is to access them in an efficient manner. Database optimization
techniques have been derived to address this issue that may otherwise limit the performance of a database to an extent of vulnerability.
We therefore discuss the aspects of performance optimization related to data access in distributed databases. We further looked at the
effect of these optimization techniques.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Decision support system is an interactive system to support decision-making process through the alternatives derived from
the processing of data, information and design models. In this research will build a decision support system modeling for the
determination of admission scholarship, as long as this problem of determining admission scholarship often become obstacles in
distribution and is not directed at the destination as expected. Therefore, in order to give a better result and overcome obstacles in the
distribution of scholarships. The problems of determining admission scholarship will be resolved through Fuzzy approach to the Analytic Hierarchy Process (AHP) is modeled in a decision support system modeling. Where Fuzzy will perform the functions of representation based membership in the assessment criteria. So the results given Fuzzy will be approached with the weight vector
given by the Analytic Hierarchy Process (AHP) which would then be carried out by the ranking process Analiytic Hierarchy Process (AHP) to determine the best alternative will be selected as scholarship recipients. After Fuzzy AHP approach in modeling decision support systems, particularly in the determination of admission scholarships and given very good results and focus on the goal as expected.
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies.
Calculation of Leakage Water and Forecast Actual Water Delivery in Town Drink...Editor IJCATR
Almost all proposals present forecast data of the variables in focus and conclude the results. However, some variables such
as water can change its volume during the traverse from source to end. Such of these variables need to be studied with loss parameters
also. This loss parameter here is leakage water. Water demand forecast can be calculated for the coming years, but leakage water also
need to be calculated and then actually delivered water to the end users has to be forecast. This paper proposed a model of piping
pattern, leakage locations. Calculated leakage water and forecast the actual delivery of water to end users. On the application side, the
results of this paper help administrators take decisions on improving infrastructure of water distributions system and take precautions
to care the maintenance of the infrastructure. The ideas and methods presented in this paper can be applied to other projects of similar
nature. On the academic research side, this formulation helps further in-depth analysis to be carried out to calculate exact leakage
water volumes. Water works departments can also benefit from this research.
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
Digital Watermark is class of marker or symbol secretly embedded in a multimedia signal such as Audio, Image or Video. It
is used to identify the ownership of the multimedia signal. Video watermarking is an emerging area for various applications like copy
control broadcast monitoring, video authentication, copyright protection and enhanced video coding. The main objective of this paper
is to present survey and comparisons of various available techniques on video watermarking based on copyright protection and
identification. Comparative study of various technologies gives the significant information about the PSNR, payload, quality factor
and also the various attacks used in video watermarking techniques. The best techniques in various scenarios are discussed in this
paper which will help the research scholars in field of video watermarking.
Effects of Supply Chain Management Practices On The Performance Of Banks In K...Editor IJCATR
The paper examines the adoption of the Supply Chain Management practices on the performance
of Banks in Kenya. This research conceptualizes and develops four dimensions of SCM practice
(outsourcing of goods & services, information & communication technology, strategic supplier
partnership, and globalization) and tests the relationships between SCM practices, and
organizational performance. The study employed descriptive design. Data for the study was
collected using a self-administered questionnaire procedure, where the questionnaires were
administered to the selected respondents through drop and pick later technique. A sample size of
33 respondents was drawn from the sample frame using simple stratified random sampling
technique to promote the needs for efficiency and representativeness from various branches and
outlets of Postbank as an organization in Nairobi County and the relationships proposed in the
framework was tested using Chi-square, T-test among other statistical tools. Data was analyzed
by aid of Statistical Package for Social Sciences (SPSS). The study will be useful in the academic
circles as it will contribute immensely towards filling the gaps in knowledge in the area of service
industry. The study found that outsourcing was important to the banks only when the appropriate
methods are employed. It also found that ICT had a major role in determining the performance of
banks as it dictated the mode of transaction and data they displayed to clients. Strategic
partnership was also important based on what it intended to achieve in enhancing the performance
of banks. Lastly, globalization is equally vital as it increases competition and exposes local banks
to global scene to experience how performance of banks can be improved. The study recommends
that correct ICT methods should be applied to promote the competitiveness of banks and improve
performance. Also it recommends that outsourcing be done only if they promote the objectives and
goals of the banking institute.
Identifying Gender from Facial Parts Using Support Vector Machine ClassifierEditor IJCATR
Gender classification can be stated as inferring female or male from a collection of facial images. There exist different
methods for gender classification, such as gait, iris, hand shape and hair, it is probably better way to find out gender based on facial
features. In this paper SVM basic kernel function has been employed firstly to detect and classify the human gender Image into
two labels i.e. (1) male and (2) female. The gender classifier achieves over 96% accuracy.
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
A Review of Storage Specific Solutions for Providing Quality of Service in St...Editor IJCATR
Predictable storage performance is a vital requirement for promising performance of the applications utilizing it and it is the
systems administrators’ job to ensure that storage performance meets the requirements of the applications. Most storage solutions are
able to virtualize the amount of storage presented to the host in a flexible way, but the same storage devices have no QOS features
.Storage level agreements provided by storage devices do not provide predictability in service delivery due to the absence of
prioritization (QOS) mechanisms in storage devices. This paper reviews some of the storage specific solutions developed to implement
quality of service in storage area networks.
ORIGINAL RESEARCHpublished 10 November 2015doi 10.3389.docxalfred4lewis58146
ORIGINAL RESEARCH
published: 10 November 2015
doi: 10.3389/fpsyg.2015.01711
Edited by:
Jesus De La Fuente,
University of Almería, Spain
Reviewed by:
Marian Berryhill,
University of Nevada, Reno, USA
Ana Miranda,
Universidad de Valencia, Spain
*Correspondence:
Stina Söderqvist
[email protected]
Specialty section:
This article was submitted to
Educational Psychology,
a section of the journal
Frontiers in Psychology
Received: 01 July 2015
Accepted: 23 October 2015
Published: 10 November 2015
Citation:
Söderqvist S and Bergman Nutley S
(2015) Working Memory Training
is Associated with Long Term
Attainments in Math and Reading.
Front. Psychol. 6:1711.
doi: 10.3389/fpsyg.2015.01711
Working Memory Training is
Associated with Long Term
Attainments in Math and Reading
Stina Söderqvist* and Sissela Bergman Nutley
Clinical Research, Pearson Clinical Assessment, Stockholm, Sweden
Training working memory (WM) using computerized programs has been shown to
improve functions directly linked to WM such as following instructions and attention.
These functions influence academic performance, which leads to the question of
whether WM training can transfer to improved academic performance. We followed
the academic performance of two age-matched groups during 2 years. As part of the
curriculum in grade 4 (age 9–10), all students in one classroom (n = 20) completed
Cogmed Working Memory Training (CWMT) whereas children in the other classroom
(n = 22) received education as usual. Performance on nationally standardized tests in
math and reading was used as outcome measures at baseline and two years later. At
baseline both classes were normal/high performing according to national standards. At
grade 6, reading had improved to a significantly greater extent for the training group
compared to the control group (medium effect size, Cohen’s d = 0.66, p = 0.045).
For math performance the same pattern was observed with a medium effect size
(Cohen’s d = 0.58) reaching statistical trend levels (p = 0.091). Moreover, the academic
attainments were found to correlate with the degree of improvements during training
(p < 0.053). This is the first study of long-term (>1 year) effects of WM training
on academic performance. We found performance on both reading and math to be
positively impacted after completion of CWMT. Since there were no baseline differences
between the groups, the results may reflect an influence on learning capacity, with
improved WM leading to a boost in students’ capacity to learn. This study is also the first
to investigate the effects of CWMT on academic performance in typical or high achieving
students. The results suggest that WM training can help optimize the academic potential
of high performers.
Keywords: working memory training, academic attainment, cognitive training, cogmed, educational psychology
INTRODUCTION
Working memory (WM) refers to the ability to keep information in mind and work with this
information. WM has a limited ca.
A powerpoint presentation of my research paper for Advanced General Psychology on "The Application of Technology to Improve Learning and Retention."
Abstract - Human learning system is highly sensitive to responsive system according the processing, mapping, motion, auditory and visualization system. Special education system is implemented to overcome the demanded sense of the human special care sensitive signals. This responsive system is balanced and effectively instrumented with modern technological learning pedagogy to bring the special need learners into the normal learning system. In the learning process, cognitive human sensors directly influence the learning effectiveness. This paper attempted to observe the cognitive load such as mental , physical , temporal ,performance , effort and frustration in the long term , short term, working , instant , responsive, process, recollect , reference , instruction and action memory and classify the observed values as per the generalized and specialized properties. The six working loads are observed in the ten types of learning system. The classification analysis aimed to predicate the pattern for learning system for specific learning challenges.
In human-computer interaction, there are
a number of design factors that designers keep in mind
while designing the user interfaces to make user
experiences easy and less painful. Affordance is one
of that and it plays a critical role in this experience.
These are the self-explanatory signs that offer the user
how an object or a system can be utilized without
making any efforts. In this research paper, we focused
and experimentally examined how affordance-based
interactions can affect the cognitive load of children's
memory. We provided the children whose ages were
between 7 to 12 years with the simple task to identify
the positions of different objects using a mental
education brain game after distracting them with a
short movie clip and observed the findings which we
will discuss in detail later.
Expo Day: Neuroenginnering, BPI, Arrowsmith Program & ARPFSharpBrains
Selected Summit Sponsors and Partners showcase their most promising brain health & enhancement initiatives and solutions.
Noon-1pm. From tomorrow’s neuroengineering to today’s brain health
*Dr. Randal Koene, Lead Scientist at Kernel, discusses future directions of neuroenginnering and human computer interfaces.
*Dr. Leanne Young, Executive Director of the Brain Performance Institute at UT-Dallas Center for BrainHealth presents the new 62,000-square-foot Brain Performance Institute.
1-1.30pm. Debbie Gilmore, Executive Director of The Arrowsmith Program, will present plans to better equip 100+ schools helping students with special needs.
1.30-2pm. Dr. Chris Walling, Chairman of the Educational Advisory Committee at The Alzheimer’s Research and Prevention Foundation (ARPF), will present the new Brain Longevity Therapy Training.
*Álvaro Fernández, CEO and Editor-in-Chief of SharpBrains
*Sarah Lenz Lock, Senior Vice President for Policy at AARP and Executive Director of the Global Council on Brain Health (GCBH)
*Dr. April Benasich, Director of the Baby Lab at the Rutgers Center for Molecular and Behavioral Neuroscience
*Chaired by: Dr. Cori Lathan, Co-Chair of the World Economic Forum’s Council on the Future of Human Enhancement
Slidedeck supporting session held during the 2017 SharpBrains Virtual Summit: Brain Health & Enhancement in the Digital Age (December 5-7th). Learn more at: https://sharpbrains.com/summit-2017/
Working memory enhancement during early childhood based on the utilization of...nooriasukmaningtyas
The use of human computer interaction is considered to be the most
culturally and socially meritorious for the learning and playing activities of
children. In this paper, a human interaction recognition system (HIRS) that
includes gesture game-based learning is investigated for identifying its
suitability and applicability in stimulation of working memory and primitive
mathematical skills among the children in the early childhood period that
ranges from 5 and 8 years. In the proposed human interaction recognition
system, the hand gestures are facilitated by the user for the objective of
controlling the computer system based on the information extracted from the
user gestures. This proposed research was implemented in three phases using
a quasi-experimental design that in turn incorporates pre-test and post-test for
investigating the behavior of experimental and control group considered from
the respondents. In the first phase, the initial evaluation of the learner’s skill
is achieved. The second phase used the developed technology in order to
identify diversified parameters in different dimensions that contribute
towards the assessment of working memory and primitive mathematical
capabilities. Finally, the third phase is responsible for actual evaluation. In
the phases of evaluation, four working memory tests such as forward corsi
blocking-tapping test, backward corsi blocking-tapping test, forward digit
span test and backwardDigit Span test was conducted. In addition, the
evaluation was also conducted for assessing primitive mathematical skill of
children using TEDI-MATH. The results confirmed that gesture interactive
game-based learning (GIGL) used by the children exhibited a predominant
improvement in the working memory and primitive mathematical skills on
par with their usual school activities.
User experience improvement of japanese language mobile learning application ...IJECEIAES
Advances in smartphone technology have led to the strong emergence of mobile learning (m-learning) on the market to support foreign language learning purposes, especially for the Japanese language. No matter what kind of m-learning application, their goal should help learners to learn the Japanese language independently. However, popular Japanese m-learning applications only accommodate on enhancing reading, vocabulary and writing ability so that user experience issues are still prevalent and may affect the learning outcome. In the context of user experience, usability is one of the essential factors in mobile application development to determine the level of the application’s user experience. In this paper, we advocate for a user experience improvement by using the mental model and A/B testing. The mental model is used to reflect the user’s inner thinking mode. A comparative approach was used to investigate the performance of 20 highgrade students with homogenous backgrounds and coursework. User experience level was measured based on the usability approach on pragmatic quality and hedonic quality like effectiveness (success rate of task completion), efficiency (task completion time) and satisfaction. The results then compared with an existing Japanese m-learning to gather the insight of improvement of our proposed method. Experimental results show that both m-learning versions proved can enhance learner performance in pragmatic attributes. Nevertheless, the study also reveals that an m-learning that employs the conversational mental model in the learning process is more valued by participants in hedonic qualities. Mean that the proposed m-learning which is developed with the mental model consideration and designed using A/B testing is able to provide conversational learning experience intuitively.
Al-Ahliyya Amman University جامعة عمان األهلية.docxgalerussel59292
Al-Ahliyya Amman University
جامعة عمان األهلية
Project
Second Semester 2019/2020
Advance Digital System
Student Name : Student ID:
EP-04-01-F151-Eng, Rev. c
Ref.: 31/19 / 2014 - 2015
Date: 09/08/2015
1-1
VENDMACH is a vending machine that accepts nickels, dimes, and quarters, and dispenses gum, apple,
or yogurt. A gum pack costs 15¢, an apple is 20¢, and yogurt is 25¢.
The ma chine has the following 1 - bit input s:
NICKEL: a signal that becomes 1 when a nickel is deposited in the coin slot.
DIME: a signal that becomes 1 when a dime is deposited in the coin slot.
QUARTER: a signal that becomes 1 when a quarter is deposited in the coin slot.
COINRETURN: a signal that becomes 1 when the coin return button is pressed.
GUM: a signal that becomes 1 when the gum selection button is pressed.
APPLE: a signal that becomes 1 when the apple selection button is pressed.
YOGURT: a signal that becomes 1 when the yogurt selection button is pressed.
Al-Ahliyya Amman University
جامعة عمان األهلية
Project
Second Semester 2019/2020
Advance Digital System
Student Name : Student ID:
EP-04-01-F151-Eng, Rev. c
Ref.: 31/19 / 2014 - 2015
Date: 09/08/2015
2-1
In addition to these “ user ” inputs, the ma chine has two control inputs:
CLOCK: a timing signal that sequences the state transitions of the machine.
INIT: an initialization signal that resets the machine to a suitable starting state.
The ma chine has thre e outputs:
CREDIT: the amount of money deposited so far and available to make a purchase;
CREDIT, in cents, should be displayed on the LEFT and RIGHT LED digits.
DISPENSED ITEM: the item that was just purchased should be displayed on the
XS40 LED: g for gum, A for apple, and y for yogurt, as indicated in Figure.
Instructions:
Use proteus software to implement the design of system and test it.
BLOOM’S TAXONOMY 2
APA Style:
All parts are not related to each other. Please answer individually APA STYLE:
Part1 – ¾ page (less than 1 page) no cover or reference page needed
https://www.ted.com/talks/michelle_thompson_education_reimagined_through_constructivism
View the TED Talk with Michelle Thompson and respond to the following after viewing this talk.
What is the benefit or benefits of constructivism? How do you believe it can help enhance the educational experience? What was one of the key "takeaways" of Michelle's experience?
Part2: 1 and 1/4 pages: cover and reference page needed
Integrating Educational Technology into Teaching
Pick one of the learning Theorists (i.e. B.F. Skinner, Robert Gagne', John Dewey, Albert Bandura, Jean Piaget, Howard Gardn.
The Fate of Online Learning Patterns and Advancements.pptxelizabethella096
Lately, education has gone through a critical change, with online learning arising as a strong power reshaping how we gain information and abilities. The Coronavirus pandemic sped up this shift, pushing teachers and students to embrace computerized stages more than ever. As we plan, it’s fundamental to inspect the patterns and developments molding the direction of online learning.
Estudio para evaluar el efecto en la memoria de trabajo en pacientes con deterioro cognitivo leve de un programa de ordenador para el entrenamiento de la memoria de trabajo.
Towards an intelligent tutoring system to down syndromeijcsit
With the rapid and the fast development of artificial intelligence technology, intelligent tutoring Systems
(ITSs) are becoming one of the most important area of research and development. Intelligent tutoring
Systems have very good impact for making computer-based instruction more adaptive and interactive.
Intelligent tutoring Systems are becoming important aspect of educational systems that makes use of
adaptive technologies to bring in aspects of a human-teacher delivering personalized and customized
tutoring to a student, into online computer-based learning environments.
Early Intervention Program (EIP) is very important to improve and enhance the overall development of
children with Tiresome 21 (Down syndrome). Up till now, there is no ITS for Early Intervention for Down
syndrome children. In order to help a child and parents in the implementation of Early Intervention
Program, a proposed ITS framework has been developed. This ITS can help his/her parents assess and
evaluate children's' skills in order to provide effective early intervention services to handicaps children
according to their mental age and to evaluate their progress and learn.
This paper explore the construction requirements to build ITS for Down syndrome children, and the points
that differ the ITS for Down syndrome from the traditional ITSs.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Ijcatr04071002
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 485 - 490, 2015, ISSN:- 2319–8656
www.ijcat.com 485
Understanding Working Memory for Improving Learning
Nahla Aljojo
King Abdul Aziz University
Faculty of Computing and
Information Technology,
Information System
Department
Jeddah, 21382, KSA
Abrar Alahmary
King Abdul Aziz University
Faculty of Computing and
Information Technology,
Information System
Department
Jeddah, KSA
Huda Saifuddin
King Abdul Aziz University
Arts and Humanities College,
Cognitive Psychology
Department
Makkah, KSA
Amany Aljedaany
King Abdul Aziz University
Faculty of Computing and
Information Technology,
Information System
Department
Jeddah, KSA
Rokaya Abduljalil Abed
King Abdul Aziz University
Faculty of Computing and
Information Technology,
Information System
Department
Jeddah, KSA
Rahma Takroni
King Abdul Aziz University
Faculty of Computing and
Information Technology,
Information System
Department
Jeddah, KSA
Abstract: A web-based working memory (WM) test system is a management system website that allows students to test their ability
and skills in remembering visual patterns. It also enables you to record and store the data for individuals. The system is developed
using HTML, PHP and MySQL as a database system to manage and store the data. The system targets several users: children and
adults who suffer from attention deficit or learning problems. The main objectives for developing the website are to educate the
community on the benefits of performing the working memory test of the activity of the brain and improvements in social skills and
improving poor academic and professional performance, especially in maths and reading comprehension. This study implements a set
of tasks, testing 59 adults aged 18-24 years of age at King Abdul-Aziz University for testing and measuring WM and cognitive
abilities. Results showed tests depended on the age entry by the user. The implications of the test results will help people know their
WM level before ascertaining the appropriate suggestions, and to make the test suit our society.
Keywords: Web-based Working Memory, Short Term Memory, Baddeley Theory, WM Training, Long Term Memory
1. INTRODUCTION
Baddeley and Hitch [1] and Baddeley [2] replaced the
concept of the short-term memory (STM) with working
memory (WM). The crucial difference was that short-term
memory was a simple store for information, while the more
modern concept of working memory is assumed to be a
cognitive component combining storage, processing and
executive control of the cognitive processes at hand.
Baddeley and Hitch defined WM as "a brain system that
provides temporary storage and manipulation of the
information necessary for complex cognitive tasks" [1].
WM plays an essential role in complex cognition so the
strength of working memory is often measured with cognitive
tests, such as repeating lists of numbers in reverse order or
recalling sequences of dots on a screen. People are constantly
throughout life dependent on their memory. The definition of
working memory is the ability to keep information on-line,
typically for a few seconds .
Memory and learning are inseparable. Therefore, you cannot
minimise the importance of memory in learning. Learning
allows us to acquire knowledge and gain new skills. The
memory is the process through which is achieved storage and
retention of this knowledge and these skills: to store and
activate what has been learned when we wish to use it again in
the future [3].
The connection between WM and learning at least in part
why WM capacity appears to predict a wide range of
academic abilities, including reading and understanding, and
gaining language, maths and thinking skills.
Several studies have found an association between
performance on domain-specific WM measures and academic
subjects.
Deficits in science and maths are the result of spatial
disabilities and weaknesses in acquiring a language and
learning English occur due to verbal WM disabilities. so the
ability of WM can help the student to limit or contribute to the
academic performance by performing some of the training.
Thus, this supports the relationship between WM, learning
and academics. Therefore, you can improve the capacity to
learn and maintain new information by strengthening the
ability of WM. You can then use this improvement for
academic achievement. This will improve reading
comprehension, and you can use it as a means to improve
educational competencies, accounting maths and logic skills
[4].
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 485 - 490, 2015, ISSN:- 2319–8656
www.ijcat.com 486
Proven by previous studies is that the study of
improvements in Visual Attention and Working Memory
through a Web-based Cognitive Training Program can
improve cognitive abilities after days of training. Thus,
Lumos developed Improvement of Visual Attention and
Working Memory through a Web-based Cognitive Training
Program that makes cognitive training tools accessible to
many people and provides benefits for an individual to change
and improve their abilities online from home. The program
comprises a set of exercises such as Memory Match and
Monster Garden to improve attention and proves you can
change the capacity of the WM in healthy adults.
"Memory Match is a speeded n-back task where users must
compare the current stimulus with those presented
previously". In addition, the idea of Monster Garden is to
navigate through several stages of the mazes while depending
on spatial memory, avoiding obstacles to move to another
stage. Also, the number of obstacles increases to provide for
more difficult stages. The results of this study indicate that
training and improving cognitive abilities such as memory,
attention and how well people interact socially, and
conducting tasks of daily living from problem-solving to
driving, are possible with a web-based application [5][6].
Another study, CogMed Working Memory Training:
CogMed WM Training, is based on the many studies designed
for individuals with ADHD and/or working memory deficits
and focuses in this research about effects on students. The
goal of the program is to determine when the WM can be
improved so the student can learn multiple skills very easily
compared to before. CogMed acts as a start for improved
learning, allowing the student to build the cognitive platform
needed to learn and achieve success in professional and
academic performance [7]. CogMed is the online program
content of a group of exercises based on age, so we
select/discuss one exercise for every age, for example.
•CogMed JM - for pre-schoolers the game is Animals
•CogMed RM - for school-age the game is visual data link
•CogMed QM - for older adolescents and adults the game
is chaos
The results of this study indicate that training can improve
WM, which enables the student to solve different problems,
especially at poor educational and academic levels and in the
case of ADHD [8][9][10]. In addition, the study of Visual
Working Memory Capacity for Emotional Facial Expressions
to evaluate the ability of visual STM.This study initial stimuli
display consisted of six different facial expressions, each of
which occupied 3.38 º x 2.58 º of visual angle. When
generating initial stimuli displays, six pictures were randomly
pulled from a set of seven pictures, with the restriction that
two or more identical expressions could never be present at
the same display. then erased the initial stimuli and presented
a blank screen for 500 ms.Then only one image of facial
expression is chosen located in one place in the initial display.
The results of this study indicate that the memory capacity is
estimated through accurate response. It has been found that
the capacity of visual memory for emotional facial
expressions work equals 3.07, which is high compared with
the ability to flip the identities and other visual stimuli [11].
Then there is the study on the Impact of Working Memory
Training on Memory Performance in Old–Old Adults. In this
study, they investigated whether training WM had a salutary
effect on the performance of WM and episodic memory
octogenarians. For this study, they developed three variants of
WM computerised training missions that seem to be more
age-appropriate. All of our WM task variants continuously
adjusted to the individual’s WM capacity in an adaptive way:
If performing well in a particular task, the task gets harder,
but if performance fell below a certain level, the task gets
easier. The results of this study appear in WM task variant 1:
substantial improvement was seen: . The results of this study
appear in WM task variant 1: substantial improvement was
seen: [12].
Finally, the study of measuring developmental changes in
WM capacity. Measure the WM performing during scanning
the place of circle and identifies to increase capacity of WM
that measure brain activity. The test focused on filled circles
which appear at the start but when the unfilled circles appear,
press the button. It was made to test for visual stimulation and
eye movements. The result indicates the difference between
the load 3 and load 5 linked with age. WMC correlated with
WM capacity and WM activity investigated the interaction
between WM load and age. There are visual stimuli in task
when load 3 tasks will show the difference in visual
simulation [13].
The aim of this study is to develop a web-based WM
system to test your ability and skills for remembering visual
patterns and training to improve the memory that involves
temporary storage by using Baddeley theory (2000) [14] for a
working memory test. We are focusing in this study on
weakness of WM and its impact on education. Also in this
paper we discuss how to measure the rate of WM to keep
information for a period of time and cognitive abilities for
improving learning. The authors chose 59 students from King
Abdul-Aziz University and randomly selected students
(females) from the Faculty of Computing and Information
Technology from different departments (computer science,
information system, information technology) for a test to
measure WM and cognitive abilities.
2. Baddeley theory
Since Alan Baddeley’s WM theory co-developed with
Graham Hitch was published in 1974 and based on his
previous studies in psychology, he has published on many
WM aspects in many journal articles. In addition, he states on
the faculty webpage, "My interests are in human memory,
neuropsychology and in the practical application of cognitive
psychology" [2][14][15].
The term WM is first applicable to computational modelling
and animal learning research after changes in cognitive
psychology in the book Plans [2][14][15]. In the past, the term
WM referred to short term memory (STM) and described the
ability to keep information over a brief period of time
(seconds) but now the concept of STM has been replaced by
WM, which has increased focus on the concept of
manipulation of information instead of passive maintenance
[16].
The working memory test depends on Baddeley theory
whose definition of working memory is the ability to keep
information on-line, typically for a few seconds. It can be
divided into "primary" memory, with a partial capacity, and
"long term" memory. It also depends on different modules
such as the Central executive (CE), Phonological loop (PL)
and Visuospatial sketchpad, but now we focus in this test on
measuring your ability and skills to remember the visual
patterns and keep information for a few seconds. For example,
some activities that are dependent on memory, such as
remembering instructions or solving mathematical problems
such as when you want to calculate the sum of numbers or
other operations require both processing and storage in the
cognitive activities. In addition, reading requires
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 485 - 490, 2015, ISSN:- 2319–8656
www.ijcat.com 487
understanding of information and retrieval in memory [17].
when individuals suffer from weakness in WM the performing
daily activities become difficult, such as can not complete the
learning activities and instructions. Thus, it is important to
verify whether WM can be improved [18]. However, until
recently, this poor WM could not be overcome, but some
success in improving performance using WM training
confirmed possible change [19].
3. Method
We met with a psychology expert to learn how to improve
WM by providing a collection of tests to assess and develop
the fundamental cognitive/mental skills and cognitive skills
of a person like WM using visual processing method. We
conducted the WM test on students of King Abdul-Aziz
University to measure their WM performance.
3.1 Participants
The total number of participants was 59 adults aged 18-24
years old. Participants in this research were mostly taken from
King Abdul-Aziz University; the experiment was done in
(Female section) the Faculty of Computing and Information
Technology from different departments (9 from information
technology, 41 from information system and 9 from computer
science department) for testing and measuring WM and
cognitive abilities.
3.2 Instruments
The task of one of the types of WM test that depended on
the Baddeley theory was created and run on computers in Lab
118. The test began at 12:00 pm and lasted until 2:00 pm; the
number of participants was 59 students from University of
king Abdul Aziz , Faculty of Computing and Information
Technology in differently departments ( computer science,
information system , Information Technology), each group
performed the test then the same way for the next group .
Before the test, I began speaking about instructional
information concerning the aims of the test and the time
required to finish it. When they began the test that appeared to
them, many pictures were displayed sequentially for 3
seconds. Each time a new picture appeared the more difficulty
(increased number of options and shapes) so as to make them
more focused on thing, place, shape, meaning they could
answer more questions and arrive at a time of higher stage
with repetition to develop memory from the STM to WM.
3.3 Procedure
The section below expounds how can be using website for
procedure Working memory tests and determine and
measure of WM by obtain the percentage of abilities.
When they had solved all 40 questions, the results were
shown to them.
Figure 1: sign up page
Starting the test:
The test start page is shown in Figure 2 and this page contains
a sign-in form and the button that directs the user to the sign-
in form, and on the left-hand side when clicked then some
instructions that contain some of examples of the test appear.
Also, the taker had to select the type of payment such as Visa
or licence number for admin validation purposes, as shown in
Figure 3.
Figure 2. Test start page
Figure 3. Test start page
Captions should be Times New Roman 9-point bold. They
should be numbered (e.g., “Table 1” or “Figure 2”), please
note that the word for Table and Figure are spelled out.
Figure’s captions should be centered beneath the image or
picture, and Table captions should be centered above the table
body.
Sign-up:
On this page, the user was required to fill in the registration
form and create an account before he/she started the test, as
shown in Figure 1.
Test page:
Now after the taker number is entered at the bottom, click
next and click on start the test (see Figures 4, 5). The test page
contains the test and displays a set of questions and every
question were displayed a set of pictures sequentially for 3
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 485 - 490, 2015, ISSN:- 2319–8656
www.ijcat.com 488
seconds. Each time a new picture appeared the more difficulty
(increased number of options and shapes) so as to make them
more focused on thing, place, shape, meaning they could
answer more questions and arrive at a time of higher stage
with repetition to develop memory from the STM to WM (see
Figures 5-13). After answering all 40 questions, the system
then calculated the correct answers and displayed two results:
the number of correct answers and the percentage depending
on the age entry for the user. Also, advice was displayed
about the result of the test concerning WM (see Figure 14).
Figure 4: Enter licence number page
Figure 5: Start the test page
Figure 6: The beginning of the test
Figure 7: Two images of fruit appear
Figure 8: A flower and a fish are displayed
Figure 9: The final two images are shown
Figure 10: Answer questions
Figure 11: Click answer for picture 1
5. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 485 - 490, 2015, ISSN:- 2319–8656
www.ijcat.com 489
Figure 12: Click answer for picture 2
Figure 13: Click answer for picture 3
Figure 14: the results of the WM test after answering all questions
4. Results
Based on an analysis of the answers, the authors found that
Twenty three participants who had the low score (the number
of correct answers being less than to the mean). This excepts
thirty-six participants who had the high score (the number of
correct answers being greater than or equal to the mean). The
mean of correct answers for all participants was = 26.3, SD=
4.8 (see Table 1). The correct answers of participants divided
into three percentiles were aggregated as follows: see Table 2.
1) <= 25% (11 participants that had the correct answers
within the [<= 25%] percentile interval.
2) >25%-50% (19 participants that had the correct answers
within the [>25%-50%] percentile interval.
3) >50%-75% (20 participants that had the correct answers
within the [>50%-75%] percentile interval.
4) >75% (9 participants that had the correct answers within
the [>75%] percentile interval.
5. Discussion
In discussing the results cited the following themes were
evident:
1) <= 25% (11 participants that had the correct answers
within the [<= 25%] percentile interval. Advice for students:
Taking action to increase brain skills is a crisis intervention to
not only improve limited capabilities but make higher levels
of skill an attainable option.
2) >25%-50% (19 participants that had the correct answers
within the [>25%-50% ] percentile interval. Advice for
students: Taking action to increase brain skills is a critical
need to overcome definite weakness, alter mental abilities and
allow their capabilities to grow.
3) >50%-75% (20 participants that had the correct answers
within the [>50%-75%] percentile interval. Advice for
students: Taking action to increase brain skills is a priority
based upon personal goals.
4) >75% (9 participants that had the correct answers within
the [>75%] percentile. Advice for students: Taking action to
increase brain skills is a critical need to overcome definite
weakness, alter mental abilities and allow their capabilities to
grow.
6. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 485 - 490, 2015, ISSN:- 2319–8656
www.ijcat.com 490
6. Conclusion
This paper discussed that impairments of working memory are
closely associated with learning deficits, as well as daily
classroom activities.Without early intervention, memory
deficits cannot be made up over time and will continue to
compromise individual’s likelihood of academic success. The
results may be useful in evaluating their problems, as well as
helping them to reduce memory-related failures that lie at the
root of substantial learning difficulties, and thus improving
the WM is strongly recommended.
7. Future work
There are many areas that can make the system more efficient
by adding greater functionality. For example:
Activation of payment procedures online by
providing payment services such as PayPal, credit
card and Visa, etc.
We used this test on elementary and Bachelor’s
level students. We hope to apply this test to all
levels of education, and to male subjects, too.
Implementing a smart phone app.
The system could be applied at a Saudi university
for improve learning.
8. Acknowledgments
We would like to thank N.Sight Brain Training and
Consultation Centre for supporting and helping in the
research.
9. References
[1] Baddeley, A. D., & Hitch, G. (1974). Working memory.
In G. A. Bower (Ed.), The psychology of learning and
motivation:Advances in research and theory (Vol. 8, pp.
47–89). New York: Academic Press.
[2] Baddeley, A. D. (1996). Exploring the central executive.
Quarterly Journal of Experimental Psychology, 49A, 5–
28.
[3] Gathercole, S. E., & Alloway, T. P. (2004). Working
memory and classroom learning. Dyslexia Review, 15,
4–9. Grace C. Ashton, Ph.D. (n.d.). Working Memory in
the Classroom and Beyond.
[4] Gropper, R. (2013). Working Memory Training In
College Students With Attentiondeficit. Ontario Institute
For Studies In Education, 129.
[5] Willis, S. L., Tennstedt, S. L., Marsiske, M., Ball, K.,
Elias, J., Koepke, K. M., Morris, J. N., Rebok, G.
W.,...Wright, E. (2006). Long-term effects of cognitive
training on everday functional outcomes in older adults.
The Journal of the American Medical Association,
296(23), 2805-2814.
[6] Labs, L. (2007). Improvement of Visual Attention and
Working Memory through a Web-based Cognitive
Training Program.
[7] Westerberg, H., Hirvikoski, T., Forssberg, H., Klingberg,
T. (2004). Visuo-spatial working memory: a sensitive
measurement of cognitive deficits in ADHD. Child
Neuropsychology, 10,155–161.
[8] Westerberg, H., & Klingberg, T. (2007). Changes in
cortical activity after training of working memory – a
single-subject analysis. Physiology and Behavior, 92(1-
2), 186- 192. Doi: 10.1016/j.physbeh. 2007.05.041
[9] Lundqvist, A., Gundström, K., & Rönnberg, J.(2010).
Computerized working memory training in a group of
patients suffering from acquired brain injury. Brain
Injury, 24(10), 1173- 1183.
[10] Johansson, B., & Tornmalm, M. (2012). Working
memory training for patients with acquired brain injury:
Effects in daily life. Scandinavian Journal of
Occupational Therapy, 19(2), 176-183.
doi:10.3109/11038128.2011.603352 .
[11] Domagoj Švegar (2011). Visual Working Memory
Capacity for. Emotional Facial Expressions,
Psychological Topics 20 (2011), 3, 489-502.
[12] Buschkuehl.M, Jaeggi.S.M, Hutchison.S, Perrig-
Chiello.P, Matthias.C, Mu¨ller.M, Breil.F, oppeler.H,
Perrig.W (2008). Impact of Working Memory Training
on Memory Performance. Psychology and Aging 2008,
Vol. 23, No. 4, 743–753.
[13] Klingberg.T, Forssberg.H, Westerberg.H. (2002).
Increased Brain Activity in Frontal and Parietal Cortex
Underlies the Development of Visuospatial Working
Memory Capacity during Childhood. Cognitive
Neuroscience, 10.
[14] Baddeley, A. D. (2000). The episodic buVer: a new
component of working memory? Trends in Cognitive
Sciences, 4, 417–423.
[15] Baddeley, A. D., Gathercole, S. E., & Papagno, C.
(1998). The phonological loop as a language learning
device.Psychological Review, 105, 158–173.
[16] Gathercole, S. a. (2008). Working Memory and Learning:
A Practical Guide for Teachers. SAGE Publications.
[17] Alloway.T.P. (2006). How does working memory work
in the classroom? Educational Research and Reviews
Vol. 1 (4), pp. 134-139, July 2006. Available online at
http:// www.academicjournals.org/ERR
[18] Alloway, T. P., Gathercole, S. E., & Pickering, S. J.
(2006).Verbal and visuo-spatial short-term and working
memory in children: Are they separable? Child
Development,77, 1698–1716.
[19] Holmes.J, Gathercole ,S., Dunning. D. (2009). Adaptive
training leads to sustained enhancement of poor working
memory in children. Blackwell Publishing Ltd, 9600
Garsington Road, Oxford OX4 2DQ, UK and.