Results (75)
Search Parameters:
Keyword: TreeCustomer Satisfaction Recognition Based on Facial Expression and Machine Learning Techniques
Nowadays, Customer satisfaction is important for businesses and organizations. Manual methods exist, namely surveys and distributing questionnaires to customers. However, marketers and businesses are looking for quick ways to get effective and efficient feedback results for their potential customers. In this paper, we propose a new method for facial emotion detection to recognize customer’s satisfaction…
Read MoreDecision Making System for Improving Firewall Rule Anomaly Based on Evidence and Behavior
Firewalls are controlled by rules which often incur anomalies. The anomalies are considered serious problems that administrators do not desire to happen over their firewalls because they cause more vulnerabilities and decrease the overall performance of the firewall. Resolving anomaly rules that have already occurred on the firewall is difficult and mainly depends on the…
Read MoreComputational Intelligence and Statistical Learning Performances on Predicting Dengue Incidence using Remote Sensing Data
Dengue is a viral infection disease transmitted to people through the bite of specific mosquito species living in a tropical zone. According to the World Health Organization, dengue has been listed among the top-ten diseases for 2019 as it makes 3.9 billion people in 128 countries be at risk of infection. One major cause of…
Read MoreUtilization of Data Mining to Predict Non-Performing Loan
In the banking industry, the existence of problem loans is inevitable. NPL (Non-Performing Loan) will certainly have an impact on the reduction in the capital of a bank. One good step in reducing the risk of credit default or the emergence of non-performing loans is to take proper care of debtors who begin to experience…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MorePersonality Measurement Design for Ontology Based Platform using Social Media Text
Human behavior quantification is an essential part of psychological science. One of the cases is measuring human personality. Social media provide rich text, which can be beneficial as a data source to get valuable insight. Previous researches show that social media offered favorable circumstances for psychological researchers by tracking, analyzing, and predicting human character. In…
Read MoreRouting Protocols for VANETs: A Taxonomy, Evaluation and Analysis
VANET as a subclass of MANET is composed of a set of vehicles equipped with wireless transceivers, to build dynamic networks without the need of any pre-existing infrastructure. Over the last few decades, the area of routing protocols in VANETs has been extensively studied. Nevertheless, this area remains even more challenging due to some features…
Read MoreNovel Cost Function based Motion-planning Method for Robotic Manipulators
In this paper an offline motion-planning algorithm is presented for robotic manipulators. In this method to solve the path-planning task, the Transition-based Rapidly-exploring Random Tree (T-RRT) algorithm was applied, that requires a cost-function over the search space. The goal of this cost-function is to keep distance between the actual position and configurations that cause collisions.…
Read MoreEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read MoreProposal Methodology of Planning and Location of Loading/Unloading Spaces for Urban Freight Vehicle: A Case Study
The problem of planning and location of loading/unloading (L/U) areas attracting interest from several researchers. This is mainly because of the heterogeneity of information and the great complexity of logistics flows. Among the projects of the urban logistics in Morocco, the L/U areas represent an essential importance in the deliveries to the centers of the…
Read MoreLogic Error Detection System based on Structure Pattern and Error Degree
The importance of programming skills has increased with advances in information and communication technology (ICT). However, the difficulty of learning programming is a major problem for novices. Therefore, we propose a logic error detection algorithm based on structure patterns, which are an index of similarity based on abstract syntax trees, and error degree, which is…
Read MoreA Perceptually Optimized Embedded Image Coder and Quality Assessor Based Both on Visual Tools
In this paper, we propose a new Perceptually Optimized Embedded Zero Tree Image Coder EVIC and its improved version MEVIC. The coder presents a new perceptual model to weight wavelet coefficients to enhance SPIHT embedded coding. The new visual coder aims to improve the visual quality obtained by the reference SPIHT coder for a given…
Read MorePredictive Modelling of Student Dropout Using Ensemble Classifier Method in Higher Education
Currently, one of the challenges of educational institutions is drop-out student issues. Several factors have been found and determined potentially capable to stimulate dropouts. Many researchers have been applied data mining methods to analyze, predict dropout students and also optimize finding dropout variables in advance. The main objective of this study is to find the…
Read MoreA Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection
This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…
Read MoreModeling an Energy Consumption System with Partial-Value Data Associations
Many existing system modeling techniques based on statistical modeling, data mining and machine learning have a shortcoming of building variable relations for the full ranges of variable values using one model, although certain variable relations may hold for only some but not all variable values. This shortcoming is overcome by the Partial-Value Association Discovery (PVAD)…
Read MoreAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreAn Approach for Determining Rules used to Select Viable Junction Design Alternatives Based on Multiple Objectives
Transport planners and engineers frequently face the challenge to determine the best design for a specific junction. Many road design manuals provide guidelines for the design and evaluation of different junction alternatives, however these mostly refer to specialized software in which the performances of design alternatives can be modelled. In the first stage of the…
Read MoreFPGA Implementation of Ultra-High Speed and Configurable Architecture of Direct/Inverse Discrete Wavelet Packet Transform Using Shared Parallel FIR Filters
This work presents new pipeline-parallel, generic and configurable parallel hardware architectures for the Direct/Inverse Wavelet Packet Transform (DWPT/IDWPT) independent of any specific family of wavelets, implemented in FPGA technology using a parallel architecture of direct FIR filter. We propose in the following paper, new P-parallel structures for the DWPT and IDWPT transforms based on the…
Read MoreEvaluation of Methods for Sentence Similarity for Use in Intelligent Tutoring System
Finding similarity of textual data is very important task in natural language processing. In this article we present approach to finding similarity of words, paragraphs, sentences and documents. Semantic similarity is one of the central tasks in many applications, including text summarization, Intelligent Tutoring Systems (ITS) etc. In ITS sentence similarity is used to compare…
Read MoreVertical Accuracy Assessment of DSM from TerraSAR-X and DTM from Aerial Photogrammetry on Paddy Fields – Karawang, Indonesia
A Digital Terrain Model (DTM) is a digital model representing the earth ‘s surface topography in three dimensions (3D) while a Digital Surface Model (DSM) represents the whole terrain including the objects on it such as trees and buildings. DTMs can be created through stereo-plotting. The advantage of this method is that the 3D data…
Read MoreApplying Machine Learning and High Performance Computing to Water Quality Assessment and Prediction
Water quality assessment and prediction is a more and more important issue. Traditional ways either take lots of time or they can only do assessments. In this research, by applying machine learning algorithm to a long period time of water attributes’ data; we can generate a decision tree so that it can predict the future…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read MoreA Novel Ultra High Speed and Configurable Discrete Wavelet Packet Transform Architecture
This work is dedicated to present a new pipeline-parallel architecture of Discrete Wavelet Packet Transform (DWPT) for all wavelet family implemented in FPGA technology. The main target of our architecture is to provide an effective performance trade-off, where it significantly increases the throughput with a restricted amount of hardware. In this article, we propose two…
Read MoreComputational Intelligence Methods for Identifying Voltage Sag in Smart Grid
In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…
Read MoreA Web-Based Decision Support System for Evaluating Soil Suitability for Cassava Cultivation
Precision agriculture in recent times had assumed a different dimension in order to improve on the poor standard of agriculture. Similarly, the upsurge in technological advancement, most especially in the aspect of machine learning and artificial intelligence, is a promising trend towards a positive solution to this problem. Therefore, this research work presents a decision…
Read More
