Results (349)
Search Parameters:
Section: csiMachine Learning Methods for University Student Performance Prediction in Basic Skills based on Psychometric Profile
Ensuring the quality of higher education in Brazil presents a complex challenge, intensified by factors that directly affect students’ academic performance. The pervasive influence of social media and the overconsumption of superficial digital content undermine students’ ability to engage in deep comprehension, critical thinking, and the practical application of knowledge. Furthermore, inadequate preparation during the…
Read MoreA Review of Natural Language Processing Techniques in Under-Resourced Languages
Natural language processing (NLP) techniques have transformed a number of tasks in the modern age of information explosion where millions of gigabytes of data are generated every day. Despite achieving state-of-the-art performance in high-resource languages, current techniques struggle with processing under-resourced languages which are characterized by data scarcity, linguistic diversity, computational limitations, ambiguity of language…
Read MoreAI-Based Photography Assessment System using Convolutional Neural Networks
Providing timely and meaningful feedback in photography education is challenging, particularly in large classes where manual assessment can delay skill development. This paper presents M-Stock, an AI-based automated photo evaluation system that uses Convolutional Neural Networks (CNNs) to assess student photography assignments on web browser. M-Stock evaluates both technical aspects (such as lighting, composition, and…
Read MoreDeploying Trusted and Immutable Predictive Models on a Public Blockchain Network
Machine learning-based predictive models often face challenges, particularly biases and a lack of trust in their predictions when deployed by individual agents. Establishing a robust deployment methodology that supports validating the accuracy and fairness of these models is a critical endeavor. In this paper, we introduce a novel approach to deploying predictive models, such as…
Read MoreAnalysis of Emotions and Movements of Asian and European Facial Expressions
The aim of this study is to develop an advanced framework that not only recognize the dominant facial emotion, but also contains modules for gesture recognition and text-to-speech recognition. Each module is meticulously designed and integrated into unified system. The implemented models have been revised, with the results presented through graphical representations, providing prevalent emotions…
Read MoreModeling Control Agents in Social Media Networks Using Reinforcement Learning
Designing efficient control strategies for opinion dynamics is a challenging task. Understanding how individuals change their opinions in social networks is essential to countering malicious actors and fake news and mitigating their effect on the network. In many applications such as marketing design, product launches, etc., corporations often post curated news or feeds on social…
Read MoreThe Graded Multidisciplinary Model: Fostering Instructional Design for Activity Development in STEM/STEAM Education
In a challenging and increasingly technological world, it is important to promote critical thinking, multidisciplinary problem solving, and collaboration through STEAM education; however, there are important economic, administrative, and especially pedagogical manage- ment limitations for its implementation at the secondary level. Therefore, this paper presents systematic recommendations for an effective and sustainable implementation of STEAM…
Read MoreSEVEN ReImagined: A Transmedia Storytelling Evolution Proposal
“Seven ReImagined” is an innovative transmedia storytelling project that reshapes the exploration of the seven deadly sins in a modern context. Building upon the original artwork “Seven”, this venture incorporates traditional media, digital tools, and the latest immersive technologies to cultivate profound user engagement and interaction. The project’s objective is to enhance understanding of timeless…
Read MoreNavigation Aid Device for Visually Impaired using Depth Camera
People with visual impairment face daily struggle of navigating through unfamiliar places. This problem mainly caused by their lack of spatial awareness, i.e., the ability to estimate the distance between themselves and their surroundings. In order for visually impaired people to navigate independently, an effective navigation aid is required. The proposed navigation aid device utilizes…
Read MoreIndoor Positioning: Comparing Different Techniques and Dealing with a user Authentication use Case
Indoor positioning is a complex issue with many, heterogeneous application cases, each one presenting different requirements and environments. In such a complex ecosystem, an agile taxonomy is needed to be able to select a proper solution for a given scenario, as well as practical recommendations for the most used solutions. Besides providing these tools, we…
Read MoreHybrid Machine Learning Model Performance in IT Project Cost and Duration Prediction
Traditional project planning in effort and duration estimation techniques remain low to medium accurate. This study seeks to develop a highly reliable and efficient hybrid Machine Learning model that can improve cost and duration prediction accuracy. This experiment compared the performance of five machine learning models across three different datasets and six performance indicators. Then…
Read MoreThe First Application of the Multistage One-Shot Decision-Making Approach to Reevaluate a Technology Project Decision Problem
Decision-makers must make a suitable sequence of decisions under uncertainty in a relatively long period for particular projects and situations. Conventional decision-making approaches under uncertainty are based on expected utility theory and do not sufficiently reflect the one-time nature of decisions. Similarly, the conventional approaches do not adequately incorporate the decision-maker’s intuitions in the decision-analysis…
Read MoreMulti-Layered Machine Learning Model For Mining Learners Academic Performance
Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…
Read MoreDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreExtended Buffer-referred Prefetching to Leverage Prefetch Coverage
This paper is an extension of the work originally presented in the 26th International Con- ference on Automation and Computing. This study regarding hardware prefetching aims at concealing cache misses, leading to maximizing the performance of modern processors. This paper leverages prefetch coverage improvement as a way to achieve the goal. Original work proposes two…
Read MoreThe Security of Information Systems and Image Processing Supported by the Quantum Computer: A review
The knowledge and understanding of the technology of quantum computers and their superiority over classical computers are still insufficient or uncertain for many communities of researchers, manufacturers, investors and the general public. For this reason, we try in this article to present and explain some of the basic concepts of quantum computers. We explain how…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreThe Perceptions of Students and Teachers When using ICTs for Educational Practices Matter: A Systematic Review
Before succumbing to the 2019 Coronavirus pandemic, information and communication technologies (ICTs) have sustained a ubiquitous presence in human lives and society. ICTs have changed the standards and dynamics of educational practices (EPs). Many academic institutions had already integrated technological-based pedagogical instructions into their educational practices but, in various cases, faced challenges of failing to…
Read MoreAutomatic Counting Passenger System using Online Visual Appearance Multi-Object Tracking
In recent years, people-counting problems have increased in popularity, especially in crowded indoor spaces, e.g., public transport. In peak hours, trains move significant numbers of passengers, producing delays and inconveniences for their users. Therefore, analysing how people use public transport is essential to solving this problem. The current analysis estimates how many people are inside…
Read MoreAnalysis of Different Supervised Machine Learning Methods for Accelerometer-Based Alcohol Consumption Detection from Physical Activity
This paper builds on the realization that since mobile devices have become a common tool for researchers to collect, process, and analyze large quantities of data, we are now entering a generation where the creation of solutions to difficult real-world problems will mostly come in the form of mobile device apps. One such relevant real-life…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreARAIG and Minecraft: A Modified Simulation Tool
Various interruptions to the daily lives of researchers have necessitated the usage of simulations in projects which may not have initially relied on anything other than physical inquiry and experiments. The programs and algorithms introduced in this paper, which is an extended version of research initially published in ARAIG And Minecraft: A COVID-19 Workaround, create…
Read More
