Results (1507)
Search Parameters:
Keyword: CatEnhancing Decision Trees for Data Stream Mining
Data stream gained obvious attention by research for years. Mining this type of data generates special challenges because of their unusual nature. Data streams flows are continuous, infinite and with unbounded size. Because of its accuracy, decision tree is one of the most common methods in classifying data streams. The aim of classification is to…
Read MoreReading Acquisition Software for Portuguese: Preliminary Results
The persistent difficulties in reading and spelling acquisition are a risk factor for learning motivation. Play-like intervention tools have been developed to face these difficulties. “I read” is a software that seeks to develop and introduce systematic reading and spelling skills training in a playful and complementary way. This software is intended for children at…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreDiscover DaVinci: Blockchain, Art and New Ways of Digital Learning
Discover DaVinci is a novel augmented reality system that incorporates blockchain technology with experiential learning to engage participants in an interactive discovery of Leonardo da Vinci’s oeuvre. The software was created by Marko Suvajdzic, first author of this paper, and it was produced at the University of Florida Digital Worlds Institute. In the true spirit…
Read MoreVoIP Codec Performance Evaluation on GRE with IPsec over IPv4 and IPv6
Scientists succeeded in implementing conventional public switch telephone network (PSTN) into internet protocol by launching H.323 IP telephony. The irrelevant and unknown captions in H.323, computer scientists have replaced H.323 by Session Initiation Protocol (SIP) for Voice-over-IP (VoIP). However, the security of voice communication over IP is still a major concern. Besides, security and performance…
Read MoreLeveraging Energy Efficiency Investments: An Innovative Web-based Benchmarking Tool
Energy Efficiency (EE) plays a key role in decreasing energy consumption at a European level, while it is considered as one of the most cost-efficient means to achieve carbon reduction and reinforce energy sufficiency and security. EE financing is imperative to implement measures that will lead to achieving the desired carbon neutrality and, thus, avert…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MoreAcoustic Scene Classifier Based on Gaussian Mixture Model in the Concept Drift Situation
The data distribution used in model training is assumed to be similar with that when the model is applied. However, in some applications, data distributions may change over time. This situation is called the concept drift, which might decrease the model performance because the model is trained and evaluated in different distributions. To solve this…
Read MoreMachine Learning Algorithms for Real Time Blind Audio Source Separation with Natural Language Detection
The Conv-TasNet and Demucs algorithms, can differentiate between two mixed signals, such as music and speech, the mixing operation proceed without any support information. The network of convolutional time-domain audio separations is used in Conv-TasNet algorithm, while there is a new waveform-to-waveform model in Demucs algorithm. The Demucs algorithm utilizes a procedure like the audio…
Read MoreA Summary of Canonical Multivariate Permutation Entropies on Multivariate Fractional Brownian Motion
Real-world applications modelled by time-dependent dynamical systems with specific properties such as long-range dependence or self-similarity are usually described by fractional Brownian motion. The investigation of the qualitative behaviour of its realisations is an important topic. For this purpose, efficient mappings from realisations of the dynamical system, i.e., time series, to a set of scalar-valued…
Read MoreEmotion Mining from Speech in Collaborative Learning
Affective states, a dimension of attitude, have a critical role in the learning process. In the educational setting, affective states are commonly captured by self-report tools or based on sentiment analysis on asynchronous textual chats, discussions, or students’ journals. Drawbacks of such tools include: distracting the learning process, demanding time and commitment from students to…
Read MoreSurvey on Novelty Detection using Machine Learning Techniques
Novelty detection affords to identify data patterns that stray strikingly from the normal behavior. it allows a good identification and classification of objects which were not known during the learning phase of the model. In this article, we will introduce an organized and comprehensive review of the study on novelty detection. We have grouped existing…
Read MoreModel Reduction H? Finite Frequency of Takagi-Sugeno Fuzzy Systems
The daily treats model reduction finite frequency (FFMR) design for Takagi Sugeno (T S) systems. This work is to FFMR design in such a way whether augmented model is steady get a reduced H? index in FF areas with noise is established as a prerequisite. To highlight the importance of suggested process, a practical application…
Read MoreAnalysis of Grid Events Influenced by Different Levels of Renewable Integration on Extra-large Power Systems
In this work, the impact of implementing a large amount of decentralized renewable energy sources (RES) of different scales on an extra-large power grid is investigated. Three scenarios are created, substituting 10%, 20%, and 30% of the conventional energy production by RES. For this purpose, the initial dynamic model of Continental Europe in combination with…
Read MoreThe Design and Implementation of Intelligent English Learning Chabot based on Transfer Learning Technology
Chatbot operates task-oriented customer services in special and open domains at different mobile devices. Its related products such as knowledge base Question-Answer System also benefit daily activities. Chatbot functions generally include automatic speech recognition (ASR), natural language understanding (NLU), dialogue management (DM), natural language generation (NLG) and speech synthesis (SS). In this paper, we proposed…
Read MoreCyber Incident Handling and the Perceptions of Learners on Cyber Incidents in South African Schools
With increases in technological usage, cyber incidents are also on the rise and have become a major concern in schools across the globe. What is of significant concern is that cyber incidents in South African schools are also on the rise. Existing evidence suggests that, in South Africa there are no clear procedures that are…
Read MoreSyncBIM: The Decision-Making BIM-Based Cloud Platform with Real-time Facial Recognition and Data Visualization
In this research we developed an BIM-based system to monitor and visualize the real-time building users information. Concentrating on building in-use stages, advantages in tracking facial recognition should be revealed through the availability of real-time information. In this way could explore the possibility of how BIM and IoT could improve data-oriented facility management. The integration…
Read MorePredicting School Children Academic Performance Using Machine Learning Techniques
The study aims to assess the machine learning techniques in predicting students’ associated factors that affect their academic performance. The study sample consisted of 5084 middle and high school students between the ages of 10 and 17, attending public and UNRWA schools in the West Bank. The ‘Health Behaviors School Children’ questionnaire for the 2013-2014…
Read MoreTraditional and Deep Learning Approaches for Sentiment Analysis: A Survey
Presently, individuals generate tremendous volumes of information on the internet. As a result, sentiment analysis is a critical tool for automating a deep understanding of user-generated information. Of late, deep learning algorithms have shown endless promises for a variety of sentiment analysis. The purpose of sentiment analysis is to categorize different descriptions as good, bad,…
Read MoreA Design of Anthropomorphic Hand based on Human Finger Anatomy
In the past decade, multiple anthropomorphic prosthetic hands have been developed to replace the role of human hands. Prostheses should not only replace the functions of human hands in functionality but also replicate human hands in appearance and sense of body-belonging intuitively. Human fingers have very delicate and complex structures, and it is these complex…
Read MorePersonalized Clinical Treatment Selection Using Genetic Algorithm and Analytic Hierarchy Process
The development of Machine Learning methods and approaches offers enormous growth opportunities in the Healthcare field. One of the most exciting challenges in this field is the automation of clinical treatment selection for patient state optimization. Using necessary medical data and the application of Machine Learning methods (like the Genetic Algorithm and the Analytic Hierarchy…
Read MoreQuantum Secure Lightweight Cryptography with Quantum Permutation Pad
Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…
Read MoreA Scheduling Algorithm with RTiK+ for MIL-STD-1553B Based on Windows for Real-Time Operation System
In devices using Windows operating system based on x86 system, the real-time performance is not guaranteed by Windows. It is because Windows is not a real-time operating system. Users who develop applications in such a Windows environment generally use commercial solutions such as the RTX or the INtime to provide real-time performance to the system.…
Read MorePersonalized Serious Games for Improving Attention Skills among Palestinian Adolescents
Serious games (SGs) are interactive and entertaining digital games with a special educational purpose. Studies have shown that SGs are effective in enhancing educational skills. Cognitive skills training through serious games have been used in improving students learning outcomes. In this article, we introduce the ‘plants kingdom’ serious game for improving adolescents’ cognitive skills, mainly…
Read MorePower Saving MAC Protocols in Wireless Sensor Networks: A Performance Assessment Analysis
Wireless sensor networks are an emerging technology that is used to monitor points or objects of interest in an area. Despite its many applications, this kind of network is often limited by the fact that it is difficult to provide energy to the nodes continuously, forcing the use of batteries, which restricts its operations. Network…
Read More
