Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-...
详细信息
Diabetic retinopathy is a retinal disease that leads to vision impairment in people suffering from diabetes mellitus. Early detection of disease requires expert supervision and computer diagnosis systems to avoid visi...
详细信息
Internet of Things (IoT) connects individual devices, software, and sensors over a network without misnomers of a public domain. It is a very common scenario in designing better low-cost enterprise solutions for smart...
详细信息
Peer instruction is instructional in guiding students to learn by answering questions, and explaining and discussing their answers with peers. Researchers recommended asking students to write down their answers and ex...
详细信息
ISBN:
(纸本)9798350307207
Peer instruction is instructional in guiding students to learn by answering questions, and explaining and discussing their answers with peers. Researchers recommended asking students to write down their answers and explanations before discussion to prevent social loafing. In addition, text-based explanations can be recorded and analyzed. The quality of students' explanations varies, ranging from superficial and low-quality to detailed and in-dept. high-quality explanations. In tradition, the qualities of students' explanations were assessed by experts. Recently, machine learning classification models have been developed and applied to classify texts. However, the level of explanations of questions are question-dependent. Thus, each question needs its classification model. Therefore, a feature transformation was applied in this study so that the explanations of different questions could be combined and applied to train the same classification model. An automated explanation quality assessment mechanism was developed based on the similarity of representative explanations of different qualities. Students' text-based explanations were collected and assessed by experts into four levels, ranging from 0 (worst) to 3 (best). The four-level classifications were merged into binary classifications of low (0 and 1) and high (2 and 3). Different classification models, including Support Vector Machine (SVM), Naive Bayes (NB), K Nearest Neighbor (KNN), Logistic Regression (LR), Random Forest (RF), and Bidirectional Encoder Representations from Transformers (BERT) were applied to train models and evaluate the accuracy of the models. In addition, three ensemble learning algorithms, including voting, stacking, and boosting, were applied to combine models chosen from SVM, NB, KNN, LR, and RF. The results showed that RF and RF+KNN+NB with stacking model showed the best accuracy (75.3%) among all four-level classification models whereas RF with boosting model showed the best accuracy (9
Sybil attacks pose a significant threat to the security and integrity of online social networks by allowing malicious actors to create multiple fake identities to manipulate network behavior. The abstract outlines a m...
详细信息
This study explores the use of Genetic Algorithms (GA) to solve the NP-hard combinatorial optimization problem known as the Travelling Salesman Problem (TSP). The suggested GA, called GA-P, performs better than conven...
详细信息
Chatbots, also known as talkbots or interactive agents, are software applications designed to facilitate communication between humans and machines. While most students in Bangladesh currently waste their valuable time...
详细信息
Many vehicular tasks shall be completed in a timely manner as they move. In automotive edge computing, a vehicle can offload such tasks to an edge server in proximity to process them faster than using the cloud comput...
详细信息
This paper presents a broad view on inductive reasoning by embedding it in theories of epistemic states, conditionals, and belief revision. More precisely, we consider inductive reasoning as a specific case of belief ...
详细信息
Any software that acts maliciously towards a user, device, or network is referred to as malware. Malware analysis consists of four fundamental processes that make use of a variety of technologies to comprehend operati...
详细信息
暂无评论