Detecting compromised campus accounts is of great significance to protecting the information security of colleges and universities. this paper proposes a method to use a machine learning model to analyze account sign-...
详细信息
Chronic heart failure (CHF) is a common illness that affects the heart. the conventional machine learning and deep learning algorithms failed to identify CHF in the early stages. So, this work implemented the ChronicN...
详细信息
In the discipline of computer vision, which aims to automatically identify text regions from photos and transform them into editable text data, text recognition in natural contexts presents a difficult task. Deep lear...
详细信息
the present study discusses the design of a digital archive for the preservation and dissemination of the Cultural and Natural Heritage of Zakynthos Island. the proposed architecture suggests a Content Management Syst...
详细信息
Project-based learning (PjBL) has been increasingly adopted in computer science courses to improve students' engagement and learning outcomes. Although a computernetworks course is in great need of a PjBL course ...
详细信息
ISBN:
(纸本)9781665444347
Project-based learning (PjBL) has been increasingly adopted in computer science courses to improve students' engagement and learning outcomes. Although a computernetworks course is in great need of a PjBL course module, no such module is available due to the huge gap between PjBL's design requirements and the current structure and content of the course. this paper introduces a novel PjBL module for a computernetworks course, which challenges the students with a real world problem of developing the communication system for a smart lock. Following the PjBL design principles, we devise several scaffolding activities and assignments, which can be integrated into a semester-long computernetworks course. We test ran the PjBL module in both undergraduate- and graduate-level computernetworks courses. Our preliminary evaluation results show that the proposed PjBL module is well received by the students and helps improve their learning outcomes.
Detecting deception through automated tools involves computational techniques to identify falsehoods in text, which is crucial for evaluating the truthfulness of testimonies in the legal field. the present research ex...
详细信息
In this paper, an improved genetic simulated annealing algorithm (SAGA) for wireless sensor networks is studied and designed. the aim of this project is to better study the optimal transmission path in wireless sensor...
详细信息
Anemia is a persistent public health problem in Peru, with significant repercussions on individual quality of life and socio-economic progress at the national level. Although the hemogram is considered the reference m...
详细信息
ISBN:
(纸本)9783031705175;9783031705182
Anemia is a persistent public health problem in Peru, with significant repercussions on individual quality of life and socio-economic progress at the national level. Although the hemogram is considered the reference method for diagnosing anemia, its need for time and a laboratory setting to be performed can represent a considerable limitation, especially in remote or less developed areas. the aim of the present research is to implement a computer vision model for the pre-diagnosis of anemia from the image of the ocular conjunctiva. the applied methodology was based on 5 phases: obtaining dataset, preprocessing, modeling and classification, feature extraction and implementation of CNN architectures. Several models were run withthe classifiers: SVM, RF, MLP, and RNN and feature extraction techniques: SIFT, SURF, ORB and HOG. the model with RF and HOG extractor obtained the highest accuracy with 79%. Finally, deep learning models were explored, adjusting parameters such as the number of neurons, epochs, and samples in each model. Although initially the custom model obtained the highest accuracy of 93.18%, the Inception-ResNet-v2 model, supported by existing studies, was finally chosen and demonstrated a robust accuracy of 90.69% and loss of 0.2788, which is better than the loss of 0.3563 obtained withthe comparison model.
the proceedings contain 144 papers. the topics discussed include: towards continuous development for quantum programming in decentralized IoT environments;automated extension-based penetration testing for web vulnerab...
the proceedings contain 144 papers. the topics discussed include: towards continuous development for quantum programming in decentralized IoT environments;automated extension-based penetration testing for web vulnerabilities;addressing imbalanced data in predicting injury severity after traffic crashes: a comparative analysis of machine learning models;short-term glucose prediction in type 1 diabetes;an implementation, evaluation and validation of a dynamic fire and conflagration risk indicator for wooden homes;navigating the local transport gap: a comprehensive development proposal for a real-time location service application;addressing local and regional recharging demand: allocation of charging stations through iterative route analysis;wearable solution for health monitoring of car drivers;and simulating incident management team response and performance.
Currently, the vast majority of international interactions and activities related to trade, government, culture, social interaction, and economics take place online. these interactions involve people, non-governmental...
详细信息
暂无评论