{"title":"A Systematic Review of the Continuous Professional Development for Technology Enhanced Learning Literature","authors":"R. Williams","doi":"10.18034/EI.V8I2.506","DOIUrl":"https://doi.org/10.18034/EI.V8I2.506","url":null,"abstract":"There is a large body of international research on raising the quality of education, with particular emphasis on CPD to support professional and pedagogical growth. From an educator’s perspective, there is widespread agreement that effective CPD is an important component of educational success. Therefore, it is unsurprising that research interest in this area has grown, particularly in light of the digital agenda. In a TEL context, educators report one of the main barriers to effective use is the lack of training in this area. This review of literature will examine some of the key ideas that form successful TEL CPD delivery, more specifically with relation to transformative models of CPD. Likewise, the section attempts to understand the context in which educators are operating and make sense of the challenges that relate to continuing professional development (CPD). In order to fully explore this phenomenon, personal development (PD) frameworks are explored, with a specific focus on Aileen Kennedy’s (2005) 9 typologies.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89902343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Difficulty of Learning Long-Term Dependencies with Gradient Flow in Recurrent Nets","authors":"N. Bynagari","doi":"10.18034/ei.v8i2.570","DOIUrl":"https://doi.org/10.18034/ei.v8i2.570","url":null,"abstract":"In theory, recurrent networks (RN) can leverage their feedback connections to store activations as representations of recent input events. The most extensively used methods for learning what to put in short-term memory, on the other hand, take far too long to be practicable or do not work at all, especially when the time lags between inputs and instructor signals are long. They do not provide significant practical advantages over, the backdrop in feedforward networks with limited time windows, despite being theoretically fascinating. The goal of this article is to have a succinct overview of this rapidly evolving topic, with a focus on recent advancements. Also, we examine the asymptotic behavior of error gradients as a function of time lags to provide a hypothetical treatment of this topic. The methodology adopted in the study was to review some scholarly research papers on the subject matter to address the difficulty of learning long-term dependencies with gradient flow in recurrent nets. RNNs are the most general and powerful sequence learning algorithm currently available. Unlike Hidden Markov Models (HMMs), which have proven to be the most successful technique in a variety of sequence processing applications, they are not limited to discrete internal states and can represent continuous, dispersed sequences. As a result, they can address problems that no other method can. Conventional RNNs, on the other hand, are difficult to train due to the problem of vanishing gradients.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74710939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing Significances of Mesh Sensors Technologies through Dimensionality Reduction Algorithm","authors":"Ruhul Amin","doi":"10.18034/EI.V8I2.556","DOIUrl":"https://doi.org/10.18034/EI.V8I2.556","url":null,"abstract":"In today's world, the breadth of real-time applications and networks is not limited to business and social activities. They are expanding as a field to provide improved and competitive settings for a variety of activities such as home, health, and commercial procedures. Data analytic method is used to maintain network accessibility as well as the robustness of expert services. It is necessary to clean up the data in order to reduce the computational complexity of extracting and pre-processing models. Because present approaches are sophisticated, they necessitate large computations. To this effect, the objective is to deploy a machine learning algorithm – “cuckoo search algorithm” for dimensionality reduction problems in data extraction for IoTs application. The cuckoo search-based feature extraction algorithm is a mutant algorithm that organizes itself depending on the unpredictable amount of input and generates a new and improved feature space. After the cuckoo search-based feature extraction is implemented, a few test benchmarks are provided to assess the performance of mutant cuckoo search algorithms. As a result of the low-dimensional data, classification accuracy is improved while complexity and expense are lowered.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87196912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT) in Agriculture: The Idea of Making the Fields Talk","authors":"Siddhartha Vadlamudi","doi":"10.18034/ei.v8i2.522","DOIUrl":"https://doi.org/10.18034/ei.v8i2.522","url":null,"abstract":"The demand for agricultural crops is moving at a slower pace compared to the human population. There must be increased agricultural productivity. Ongoing innovative advances have added to the ascent of exactness agribusiness, empowering farmers to settle on better choices with more data about their soil, water, yield, and local environment, yet has been generally restricted to popularized and production of cash crops. The objective of smart agribusiness research is to ground a dynamic emotionally supportive network for the management of farms. IoT is being used in agriculture to get to know the crop field by utilizing sensors for monitoring, controlling in the field. It is used to get to know the crop field by utilizing sensors for monitoring, controlling in the field, etc. Recent developments in IoT, comparison between traditional and smart agriculture, and the roles of IoT in agriculture were analyzed in this study. The articles were purposively inspected while the qualitative data gathered was dissected utilizing content analysis. Summarily, the rise of smart agriculture has lowered the practice of traditional farming, as it has enhanced it in no small way. The research likewise showed that the lacuna in agriculture can be filled with IoT. Scalability in technology should be encouraged without affecting the functionalities of the existing infrastructures.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86297842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Indexing and Sorting Management System – Automated Search Indexing and Sorting of Various Topics","authors":"Apoorva Ganapathy, Takudzwa Fadziso","doi":"10.18034/EI.V8I2.554","DOIUrl":"https://doi.org/10.18034/EI.V8I2.554","url":null,"abstract":"An issue that the majority of the databases face is the static and manual character of indexing activities. This traditional method of indexing and sorting different topics is confirmed to shake the dataset performance somewhat, making downtime and a potential effect in the presentation that is normally addressed by manually indexing operations. Numerous data mining methods can accelerate this process by using proper indexing structures. Choosing the appropriate index generally relies upon the kind of operation that the algorithm performs against the dataset. Topic indexing is the operation of recognizing the principal topics covered by a document. These are helpful for some reasons: as subject headings in libraries, as keywords in scholarly articles, and as hashtags on social media platforms. Knowing a document’s topic assists individuals with deciding its importance quickly. In any case, assigning topics manually is a tedious and redundant task. This paper shows the best way to create them automatically in a way that contends with manual indexing done by humans. This paper also talks about the issues and the techniques for identifying applicable data in a huge variety of documents. The contribution of this thesis to this issue is to foster better content analysis techniques that can be utilized to describe document content with automated index terms. Index terms can be used as meta-data that defines documents and is utilized for seeking various topics. The main point of this paper is to show the way toward creating an automatic indexer which analyzes the topic of documents by integrating proof from word frequencies and proof from the linguistic analysis given by a syntactic parser. The indexer weighs the expressions of a document as per their assessed significance for depicting the topic of a given document based on the content analysis.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78484815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of Power System during Cyber-Attack using Artificial Neural Network","authors":"Md. Shahidul Islam, Ruet, Shafia Sultana, Md. Motakabbir Rahman","doi":"10.18034/ei.v7i2.478","DOIUrl":"https://doi.org/10.18034/ei.v7i2.478","url":null,"abstract":"Impacts of frequency and voltage disturbance on an isolated power system caused by cyber-attack have been discussed, and a neural network-based protective approach has been proposed in this research work. Adaptive PID controllers for both load frequency control and automatic voltage regulator have been implemented using an artificial neural network-oriented by genetic algorithm. The parameters of the PID controller have been tuned offline by using a genetic algorithm over a wide range of system parameter variations. These data have been used to train the neural network. Three input switch has been implemented to control governor speed regulation and amplifier gain. For load frequency control neural network tuned PID controller mitigate frequency disturbance 48% faster than manually tuned PID and for the automatic voltage regulator, neural network tuned PID controller mitigate voltage disturbance 70% faster than manually tuned PID during cyber-attack.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83838294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualizing the Impact of Cyberattacks on Web-Based Transactions on Large-Scale Data and Knowledge-Based Systems","authors":"Mani Manavalan, Nur Mohammad Ali Chisty","doi":"10.18034/ei.v7i2.578","DOIUrl":"https://doi.org/10.18034/ei.v7i2.578","url":null,"abstract":"Manual approaches rely on the abilities and knowledge of individual human administrators to detect, analyze, and interpret attacks. Intrusion Detection Systems (IDS) are systems that can automatically detect and warn the appropriate persons when an attack occurs. Despite the fact that individual attacks can be useful, they are frequently insufficient for understanding the entire attacking process, as well as the attackers' talents and objectives. The attacking stage is usually merely a component of a larger infiltration process, during which attackers gather information and set up the proper conditions before launching an attack, after which they clear log records in order to conceal their footprints and disappear. In today's assault scenarios, the pre-definition of cause-and-effect links between events is required, which is a tough and time-consuming task that takes considerable effort. Our technique for creating attack scenarios is based on the linking nature of web pages, and it does not require the pre-definition of cause and effect links, as demonstrated in previous work. Constructed situations are displayed in spatial and temporal coordinate systems to make viewing and analyzing them more convenient. In addition, we develop a prototype implementation of the concept, which we utilize to test a number of assault scenario scenarios.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72933946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carrier Concentration in Bulk Perovskite CH3NH3PbI3 Thin Films","authors":"C. Mosiori, M. Charles","doi":"10.18034/ei.v7i2.475","DOIUrl":"https://doi.org/10.18034/ei.v7i2.475","url":null,"abstract":"Efforts are currently on going on the physics of photo electrics in methyl ammonium lead halide perovskites to unveil the secret of its success in photovoltaics. Since carrier concentration depends on impurity, temperature and other parameters of a semiconductor, herein, an attempt has been made address the relationship between these parameter and carrier concentrations. It was found out that the conventional band edge at 1.58 eV responsible for presenting a blue-shift depends on thickness, temperature and carrier concentration. Thus, in this work, the intrinsic carrier concentration was taken as the number of electrons and it was shown that the observed unusual optical band edge in CH3NH3PbI3 perovskite bulk thin films is about 1.58eV. It was concluded that the band edge is beneficial for photo electric effect by making use of its inhibited radiative recombination.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73489400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planar and Nonplanar Solitons in Multi-Ion Dusty Plasma","authors":"F. Deeba, K. Islam, Abdullah Al Mamun","doi":"10.18034/ei.v7i2.474","DOIUrl":"https://doi.org/10.18034/ei.v7i2.474","url":null,"abstract":"A rigorous theoretical investigation has been made on nonlinear dust-ion-acoustic (DIA) solitary waves (SWs) in a multi-ion dusty plasma system, consisting of inertial positive and negative ions, and arbitrary charged stationary dust. The dust particles have been considered as arbitrarily (either positively or negatively) charged in order to observe the effects of dust polarity on the DIA SWs. Three different approaches (K-dV (Korteweg-de Vries), mK-dV (mixed K-dV), and Gardner) have been employed to analysis the entire regime. The reductive perturbation method has been employed in all these three approaches. Using reductive perturbation method, we first derive K-dV equation which let us to analyze both types (bright and dark) of solitons, but, in a very limited region. After that mK-dV equation has been derived which let us analyze bright soliton for a large region, but cannot show the dark soliton. Finally, we have derived the Gardner equation employing the same method, through which we were able to analyze both the bright and dark solitons for a large region. We also employed the modified Gardner (mG) equation to observe the effects of nonplanar geometry as well as time evolution of SWs. It has been found that both the positive and negative solitons depend on the ion number density of the ions, dust polarity, temperature, as well as time scale. It is also shown that the properties of the nonplanar (cylindrical and spherical) DIA-GSs are significantly different from those of the one dimensional planar ones.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84564207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Visitor’s Hybrid Smart Guide Control System","authors":"C. Mosiori","doi":"10.18034/ei.v7i1.452","DOIUrl":"https://doi.org/10.18034/ei.v7i1.452","url":null,"abstract":"Modern industrial society is filled with hybrid systems. The effectiveness of a control system is now a basic requirement in any institution. In general terms, hybrid systems are reactive systems that intermix discrete and continuous control components in which the discrete part of that control system makes the decision on behaving for the whole designed system and further decides if it can allow it to switch to another set of control protocols when appropriate conditions are availed. The continuous part only functions according to a specified protocol. Hybrid systems are common models used in digital (logic) and continuous networks and devices. Digital control programs detect, control, and supervise continuous and discrete systems using differential or difference equations. This principle was utilized in our design and reported thereof. Although this work developed a different method to deal with specific problems facing students at Technical University of Mombasa. An upgrade was recommended so as to extend the control system to the eye- impaired students and visitors. Since the issue of optimal smart control systems cannot be ignored in the design of new control systems with today's requirements in our learning institutions, it was concluded that further research was necessary to bring about a fully reliable and well-developed control system able to use real-time and real routes as they exist at the university ground. This work reports a hybrid control guide system designed and implemented at the Technical University of Mombasa. \u0000 ","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84653862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}