Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Future Computing and Informatics Journal

Discipline
Keyword
Publication Year

Articles 1 - 30 of 83

Full-Text Articles in Computer Engineering

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif Jul 2023

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif

Future Computing and Informatics Journal

This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …


Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2023

Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business …


News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami Jul 2023

News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami

Future Computing and Informatics Journal

Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model …


Visual Question Answering: A Survey, Gehad Assem El-Naggar Jul 2023

Visual Question Answering: A Survey, Gehad Assem El-Naggar

Future Computing and Informatics Journal

Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …


A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees Jan 2023

A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees

Future Computing and Informatics Journal

most applied methods in the software development industry. However, agile methodologies face some challenges such as less documentation and wasting time considering changes. This review presents how the previous studies attempted to cover issues of agile methodologies and the modifications in the performance of agile methodologies. The paper also highlights unresolved issues to get the attention of developers, researchers, and software practitioners.


Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban Jan 2023

Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban

Future Computing and Informatics Journal

Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …


Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2022

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …


The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi Nov 2021

The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi

Future Computing and Informatics Journal

different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems.

Many Software companies failed to achieve information follow and reuse the same functionality

This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles providing rules and guidelines that specify exactly how solution logic should be decomposed and molded into technology solutions

Teeeeeeeest


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim Nov 2021

Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim

Future Computing and Informatics Journal

Academic advising plays a vital role in achieving higher educational institution’s purposes. Academic advising is a process where an academic advisor decides to select a certain number of courses for a student to register in each semester to fulfil the graduation requirements. This paper presents an Academic Advising Decision Support System (AADSS) to enhance advisors make better decisions regarding their students’ cases. AADSS framework divided into four layers, data preparation layer, data layer, processing layer and decision layer. The testing results from those participating academic advisors and students considered are that AADSS beneficial in enhancing their decision for selecting courses.


Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed Nov 2021

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed

Future Computing and Informatics Journal

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …


A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees Ami Nov 2021

A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees Ami

Future Computing and Informatics Journal

A feature is a single measurable criterion to an observation of a process. While knowledge discovery techniques successfully contribute in many fields, however, the extensive required data processing could hinder the performance of these techniques. One of the main issues in processing data is the dimensionality of the data. Therefore, focusing on reducing the data dimensionality through eliminating the insignificant attributes could be considered one of the successful steps for raising the applied techniques’ performance. On the other hand, focusing on the applied field, ovarian cancer patients continuously suffer from the extensive analysis requirements for detecting the disease as well …


A Configurable Mining Approach For Learning Services Customization, Aya M. Mostafa Amm, Yehia M. Helmy Ymh, Amira M. Idrees Ami Jul 2021

A Configurable Mining Approach For Learning Services Customization, Aya M. Mostafa Amm, Yehia M. Helmy Ymh, Amira M. Idrees Ami

Future Computing and Informatics Journal

There is no doubt that this age is the age of data and technology. Moreover, there is tremendous development in all fields. The personalized material is a good approach in the different fields. It provides a fit material that matches the styles of readers. It supports readers in various reading domains. This research paper aims to support students in the educational system. Additionally, the research paper designs to increase education values for students. Furthermore, the research paper builds the smart appropriate materials through Egyptian Knowledge Banking (EKB) based on the learner question. The Egyptian Knowledge Bank (EKB) is a rich …


Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban Jul 2021

Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban

Future Computing and Informatics Journal

The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …


Performance Analysis Of Whale Optimization Based Data Clustering, Ahamed Shafeeq B M, Zahid Ahmed Ansari, Shyam Karanth May 2021

Performance Analysis Of Whale Optimization Based Data Clustering, Ahamed Shafeeq B M, Zahid Ahmed Ansari, Shyam Karanth

Future Computing and Informatics Journal

Data clustering is the method of gathering of data points so that the more similar points will be in the same group. It is a key role in exploratory data mining and a popular technique used in many fields to analyze statistical data. Quality clusters are the key requirement of the cluster analysis result. There will be tradeoffs between the speed of the clustering algorithm and the quality of clusters it produces. Both the quality and speed criteria must be considered for the state-of-the-art clustering algorithm for applications. The Bio-inspired technique has ensured that the process is not trapped in …


Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan May 2021

Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan

Future Computing and Informatics Journal

In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …


Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad May 2021

Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad

Future Computing and Informatics Journal

A common symptom of Parkinson's Disease is Freezing of Gait (FoG) that causes an interrupt of the forward progression of the patient’s feet while walking. Therefore, Freezing of Gait episodes is always engaged to the patient's falls. This paper proposes a model for Freezing of Gait episodes detection and prediction in patients with Parkinson's Disease. Predicting Freezing of Gait in this paper considers as a multi-class classification problem with 3 classes namely, FoG, pre-FoG, and walking episodes. In this paper, the extracted feature scheme applied for the detection and the prediction of FoG is Convolutional Neural Network (CNN) spectrogram time-frequency …


A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami May 2021

A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami

Future Computing and Informatics Journal

Due to the changing dynamics of the business environment, organizations need to redesign or reengineer their business processes in order to provide services with the lowest cost and shortest response time while increasing quality. Thence, Business Process Re-engineering (BPR) provides a roadmap to achieve operational goals that leads to enhance flexibility and productivity, cost reduction, and quality of service/product. In this paper, we propose a literature review for the different proposed models for Business Process Reengineering. The models specify where the breakdowns occur in BPR implementation, justifies why such breakdowns occur, and propose techniques to prevent their occurrence again. The …


Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi Dec 2020

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi

Future Computing and Informatics Journal

Sickle cell disease is a severe hereditary disease caused by an abnormality of the red blood cells. The current therapeutic decision-making process applied to sickle cell disease includes monitoring a patient’s symptoms and complications and then adjusting the treatment accordingly. This process is time-consuming, which might result in serious consequences for patients’ lives and could lead to irreversible disease complications. Artificial intelligence, specifically machine learning, is a powerful technique that has been used to support medical decisions. This paper aims to review the recently developed machine learning models designed to interpret medical data regarding sickle cell disease. To propose an …


A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany Dec 2020

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany

Future Computing and Informatics Journal

Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …


Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy Dec 2020

Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy

Future Computing and Informatics Journal

Background: Early event detection, monitor, and response can significantly decrease the impact of disasters. Lately, the usage of social media for detecting events has displayed hopeful results. Objectives: for event detection and mapping; the tweets will locate and monitor them on a map. This new approach uses grouped geoparsing then scoring for each tweet based on three spatial indicators. Method/Approach: Our approach uses a geoparsing technique to match a location in tweets to geographic locations of multiple-events tweets in Egypt country, administrative subdivision. Thus, additional geographic information acquired from the tweet itself to detect the actual locations that …


A Comparative Study For Methodologies And Algorithms Used In Colon Cancer Diagnoses And Detection, Mona Mohamed Nasr, Laila Mohamed Abdelhamid, Naglaa Shehata Sep 2020

A Comparative Study For Methodologies And Algorithms Used In Colon Cancer Diagnoses And Detection, Mona Mohamed Nasr, Laila Mohamed Abdelhamid, Naglaa Shehata

Future Computing and Informatics Journal

Colon cancer is also referred to as colorectal cancer; it is a kind of cancer that starts with colon damage to the large intestine in the last section of the digestive tract. Elderly people typically suffer from colon cancer, but this may occur at any age. It normally starts as a little, noncancerous (benign) mass of cells named polyps that structure within the colon. After a period of time these polyps can turn into advanced malignant tumors that attack the human body and some of these polyps can become colon cancers. So far, no concrete causes have been identified and …


Machine Learning Techniques For Credit Card Fraud Detection, Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, Wael Khalifa, Mohamed Ismail Roushdy, Abdel-Badeeh M. Salem Sep 2020

Machine Learning Techniques For Credit Card Fraud Detection, Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, Wael Khalifa, Mohamed Ismail Roushdy, Abdel-Badeeh M. Salem

Future Computing and Informatics Journal

The term “fraud”, it always concerned about credit card fraud in our minds. And after the significant increase in the transactions of credit card, the fraud of credit card increased extremely in last years. So the fraud detection should include surveillance of the spending attitude for the person/customer to the determination, avoidance, and detection of unwanted behavior. Because the credit card is the most payment predominant way for the online and regular purchasing, the credit card fraud raises highly. The Fraud detection is not only concerned with capturing of the fraudulent practices, but also, discover it as fast as they …


Proposed Framework For Smart Healthcare Services, Dalia K. A. A. Rizk, Hoda Hosny Prof. Dr., El-Sayed M. El-Horbaty Prof. Dr., Abdel-Badeeh M. Salem Prof. Dr. Sep 2020

Proposed Framework For Smart Healthcare Services, Dalia K. A. A. Rizk, Hoda Hosny Prof. Dr., El-Sayed M. El-Horbaty Prof. Dr., Abdel-Badeeh M. Salem Prof. Dr.

Future Computing and Informatics Journal

Smart healthcare is of great interest to researchers and governments due to the increasing development of new smart cities. However, there is no current standard practice to format the cloud computing infrastructure and to assist the healthcare system architect in designing a comprehensive solution for the basic services that are required by the healthcare users while taking into consideration a balanced approach towards their specific functional and non-functional needs such as openness, scalability, concurrency, interoperability and security factors. The integration of smart healthcare services with cloud computing needs a concrete framework. The main objective of this paper is to analyze …


Intelligent Technique For Automating The Conversion Between Major And Minor Melodies, Nermin N. J. Siphocly, El-Sayed M. El-Horbaty, Abd El-Badea Mohamed Salem Prof Sep 2020

Intelligent Technique For Automating The Conversion Between Major And Minor Melodies, Nermin N. J. Siphocly, El-Sayed M. El-Horbaty, Abd El-Badea Mohamed Salem Prof

Future Computing and Informatics Journal

Nowadays, computers are extremely beneficial to music composers. Computer music generation tools are developed for aiding composers in producing satisfying musical pieces. The automation of music composition tasks is a challenging research point, specially to the field of Artificial Intelligence. Converting melodies that are played on a major scale to minor (or vice versa) is interesting to both composers and music listeners. Newly converted melodies of famous songs, either from major to minor or the opposite, are becoming blockbusters on the social media. In this paper we propose an intelligent method for automating the conversion between major and minor melodies …


Ontological Engineering For Source Code Generation, Anas Hamid Aloklah, Walaa Gad, Mostafa Mohamed Aref Prof, Abd El-Badea Mohamed Salem Prof Sep 2020

Ontological Engineering For Source Code Generation, Anas Hamid Aloklah, Walaa Gad, Mostafa Mohamed Aref Prof, Abd El-Badea Mohamed Salem Prof

Future Computing and Informatics Journal

Source Code Generation (SCG) is the sub-domain of the Automatic Programming (AP) that helps programmers to program using high-level abstraction. Recently, many researchers investigated many techniques to access SCG. The problem is to use the appropriate technique to generate the source code due to its purposes and the inputs. This paper introduces a review and an analysis related SCG techniques. Moreover, comparisons are presented for: techniques mapping, Natural Language Processing (NLP), knowledge base, ontology, Specification Configuration Template (SCT) model and deep learning


Similarity Evaluation Based On Contextual Modelling, Mohamed H. Haggag, Marwa M. A. Elfattah, Ahmed Mohammed Ahmed Jun 2020

Similarity Evaluation Based On Contextual Modelling, Mohamed H. Haggag, Marwa M. A. Elfattah, Ahmed Mohammed Ahmed

Future Computing and Informatics Journal

Measuring Text similarity problem still one of opened fields for research area in natural language processing and text related research such as text mining, Web page retrieval, information retrieval and textual entailment. Several measures have been developed for measuring similarity between two texts: such as Wu and Palmer, Leacock and Chodorow measure and others . But these measures do not take into consideration the contextual information of the text .This paper introduces new model for measuring semantic similarity between two text segments. This model is based on building new contextual structure for extracting semantic similarity. This approach can contribute in …


Adaptive Concept Map Approach For Software Requirements Validation, Ayman Khedr, Ahmed A. Ahmed, Sherif Kholeif Jun 2020

Adaptive Concept Map Approach For Software Requirements Validation, Ayman Khedr, Ahmed A. Ahmed, Sherif Kholeif

Future Computing and Informatics Journal

Requirements validation is one of the most significant and critical parts of the requirements engineering. This activity ensures that the set of requirements is accurate, right, complete, and consistent. Requirements validation is considered as the key activity because mistakes found in a software requirements document can lead to extensive rework costs when they are discovered either during development or after the system is in service. There are some commonly used bases to validate user requirements such as: Natural language, Design description languages, Graphical notations and Mathematical specification languages. Whereas the graphical notations are the most suitable means to be used …


Generic Approach For Customer Management System, Esraa A. Afify, Mona A. Kadry Jun 2020

Generic Approach For Customer Management System, Esraa A. Afify, Mona A. Kadry

Future Computing and Informatics Journal

Customer Complaints are considered as valuable and significant information that can be utilized to attain customer satisfaction. Accordingly, a complaint handling system can address customer dissatisfaction and prevent similar problems from reoccurring. The aim of this paper is to investigate the level of relationship between the complaints and complaint behaviours of the customers who benefit from the services offered. In this paper, a generic approach for the Customer Complaint Management System is pro posed to have the ability to minimize customers’ dissatisfaction and on the other hand to motivate customers to take part of controlling the quality of the services …


A General Approach Students’ Attitude Towards To Virtual Reality Technology In Distance Education Environment, Osama Emam, Mohamed Abdelsalam, Ayman E. Khedr, Yehia Helmy Jun 2020

A General Approach Students’ Attitude Towards To Virtual Reality Technology In Distance Education Environment, Osama Emam, Mohamed Abdelsalam, Ayman E. Khedr, Yehia Helmy

Future Computing and Informatics Journal

E-learning has become a prominent and effective role in recent years. The factor of place and time became ineffective in the educational process. So that anyone can learn anywhere in the world. The educational services that benefit the learner during the educational process as well as the factors of assistance are important elements that help in the success of the educational process in the environment of e-learning. The more these services, the greater the benefit from e-learning. But its way of reviewing electronic content is still ineffective. Therefore it was necessary to create a suitable environment for the learner is …