Results (220)
Search Parameters:
Keyword: EvaluationEffectiveness of a voice analysis technique in the assessment of depression status of individuals from Ho Chi Minh City, Viet Nam: A cross-sectional study
The Mind Monitoring System (MIMOSYS) is a novel voice analysis technique for mental health assessment that has been validated in some languages; however, no research has been conducted on the Vietnamese yet. This study aimed to examine the ability of the Vitality score extracted from the MIMOSYS system to assess depression status based on the…
Read MoreProposal and Implementation of Seawater Temperature Prediction Model using Transfer Learning Considering Water Depth Differences
Aquaculture is one of the most important industries worldwide, and most marine products are produced by aquaculture. On the other hand, the aquaculture farmers are faced on the challenge of damage to marine products due to abnormal seawater temperatures. Research on seawater temperature prediction have been conducted, but many of them require a large amount…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreEfficient Deep Learning-Based Viewport Estimation for 360-Degree Video Streaming
While Virtual reality is becoming more popular, 360-degree video transmission over the Internet is challenging due to the video bandwidth. Viewport Adaptive Streaming (VAS) was proposed to reduce the network capacity demand of 360-degree video by transmitting lower quality video for the parts of the video that are not in the current viewport. Understanding how…
Read MoreSolar Photovoltaic Power Output Forecasting using Deep Learning Models: A Case Study of Zagtouli PV Power Plant
Forecasting solar PV power output holds significant importance in the realm of energy management, particularly due to the intermittent nature of solar irradiation. Currently, most forecasting studies employ statistical methods. However, deep learning models have the potential for better forecasting. This study utilises Long Short-Term Memory (LSTM), Gate Recurrent Unit (GRU) and hybrid LSTM-GRU deep…
Read MoreA Novel Metric for Evaluating the Stability of XAI Explanations
Automated systems are increasingly exerting influence on our lives, evident in scenarios like AI-driven candidate screening for jobs or loan applications. These scenarios often rely on eXplainable Artificial Intelligence (XAI) algorithms to meet legal requirements and provide understandable insights into critical processes. However, a significant challenge arises when some XAI methods lack determinism, resulting in…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreDetailed Study of a Proposal for a Computer Based Tutoring Strategy
In this article, we propose a new tutoring strategy to combat school dropout in Morocco. This strategy is based on a collaborative approach involving educational administration and teachers at the national level to ensure equity and equal opportunities for all Moroccan students, on the one hand, and the quality of the training, on the other.…
Read MoreHybrid Discriminant Neural Networks for Performance Job Prediction
Determining the best candidates for a certain job rapidly has been one of the most interesting subjects for recruiters and companies due to high costs and times that takes the process. The accuracy of the models, particularly, is heavily influenced by the discriminant variables that are chosen for predicting the candidates scores. This study aims…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreEstimating Subjective Appetite based on Cerebral Blood Flow
This study aims to develop and validate a biological food preference task that simultaneously evaluates biological responses to visual stimuli of various food states and subjective evaluations of foods and to examine how these biological responses are related to food preference behavior. We recruited seventeen healthy male and female subjects to observe changes in cerebral…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreRealization of Skillful Musical Saw Bowing by Industrial Collaborative Humanoid Robot
We have been studying the application of the musical saw, an unknown and advanced tool, to a cooperative humanoid robot for industrial use. A sound feedback system using mallet strike technique and the sound generated by the technique was constructed in the previous reports. The system enables tuning to a target frequency and control to…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreLung Cancer Tumor Detection Method Using Improved CT Images on a One-stage Detector
Owing to the recent development of AI technology, various studies on computer-aided diagnosis systems for CT image interpretation are being conducted. In particular, studies on the detection of lung cancer which is leading the death rate are being conducted in image processing and artificial intelligence fields. In this study, to improve the anatomical interpretation ability…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreEfficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage
Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…
Read MoreValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreInnovations in Recruitment—Social Media
The main objective and contribution of the paper is to describe the creation of a model to support recruitment using social media information and its deployment in practice. The model includes the design of an automated solution for downloading social media data and a proposal for the subsequent analysis and creation of a predictive model…
Read MoreService Robot Management System for Business Improvement and Service Extension
Service robots are applied in many kinds of business fields and its various kinds of data can be collected with service robot in business scenes. Therefore, it becomes more important to utilize such data for business improvement. Additionally, due to limitation of design such as body size and battery life, a service robot cannot prepare…
Read MoreA Summary of Canonical Multivariate Permutation Entropies on Multivariate Fractional Brownian Motion
Real-world applications modelled by time-dependent dynamical systems with specific properties such as long-range dependence or self-similarity are usually described by fractional Brownian motion. The investigation of the qualitative behaviour of its realisations is an important topic. For this purpose, efficient mappings from realisations of the dynamical system, i.e., time series, to a set of scalar-valued…
Read More
