Voice synthesizers still present several challenges in the speech of mathematical content, as spoken mathematics has quite peculiar rules. In the synthesized speech, pauses help blind and visually impaired students id...
详细信息
Chicken is an economic animal. one kind At present, it has been raised as a business and has expanded extensively. This is because both domestic and foreign populations have a greater demand for products and processed...
详细信息
Chicken is an economic animal. one kind At present, it has been raised as a business and has expanded extensively. This is because both domestic and foreign populations have a greater demand for products and processed products from laying hens. which the raising of laying hens must be more attention to the productivity and quality of eggs in order to meet the needs of consumers with high or low temperatures Too low has an effect on the physiological system of laying hens. Reduce egg production or may result in inefficient production. And with the aforementioned problems, technology has been used to help in notifying. Warn whether the temperature in the house is suitable to increase the production of high-quality eggs.
The number of Android malicious applications keeps growing as time passes, even paving their way to official app markets. In recent years, a promising malware detection approach makes use of the compiled app source co...
详细信息
The number of Android malicious applications keeps growing as time passes, even paving their way to official app markets. In recent years, a promising malware detection approach makes use of the compiled app source codes (dex), through convolutional neural networks (CNN) as an image classification task. Unfortunately, current proposals often rely on unrealistic datasets, focusing their detection on the mal-ware families, while neglecting the detection of malware apps in the first place. In this paper, we propose a reliable and hierarchical Android malware detection through an image-based CNN scheme, implemented twofold. First, Android malware classification is performed in a hierarchically-structured local manner, initially identifying malware apps, then, their related family. Second, to ensure reliability and improve classification accuracy, only highly confident classified apps are reported, in a classification with reject option rationale. Experiments performed in a new dataset with over 26 thousand Android apps, divided into 29 malware families, compounding over 13 GB of app dex images, have shown that current image-based CNN for malware detection is unable to provide high detection accuracies. In contrast, our proposed model is able to reliably detect malware apps, improving the true-negative rates by up to 5.5%, and the average true-positive rate of the malware families of accepted apps by up to 12.7%, while rejecting only 10% of Android apps.
Sign language has importance rule to deal with communication process especially with impairments hearing people. Sign language detection also attract lot of researchers to join the challenge of research to detect and ...
详细信息
Sign language has importance rule to deal with communication process especially with impairments hearing people. Sign language detection also attract lot of researchers to join the challenge of research to detect and recognize the sign language in the field of computerscience. Hence, there is still no any standard approach and method to recognize the meaning in every pose of sign language. This research proposed a mechanism to detect Alphabet American Sign Language by utilizing Convolutional Neural Network (CNN) process. The CNN approach was chosen based on the ability and capability to recognize image. In this research, MNIST dataset is used for traning and testing process. The proposed CNN architecture produced 97% of accuracy that outperform the previous research using the same dataset which made this architecture promising.
In the digital transformation era, Metaverse offers a fusion of virtual reality (VR), augmented reality (AR), and web technologies to create immersive digital experiences. However, the evolution of the Metaverse is sl...
详细信息
E-learning satisfaction is an important factor in assessing the effectiveness and efficiency of distance learning. The use of Big Data technology can have a significant impact on e-learning satisfaction. The purpose o...
E-learning satisfaction is an important factor in assessing the effectiveness and efficiency of distance learning. The use of Big Data technology can have a significant impact on e-learning satisfaction. The purpose of this research is to examine the implementation of big data in e-learning and the factors that can increase student e-learning satisfaction. This study uses a quantitative survey method with a questionnaire as a data collection tool. The research respondents were randomly selected e-learning students from several educational institutions that use Big Data technology in their e-learning platforms. There are 663 data collected through online questionnaires, then the data is processed through SmartPLS to test the research hypothesis. The results of the study show that the use of Big Data technology in an e-learning environment has a positive impact on student satisfaction. Several factors determine e-learning satisfaction including usability requirements, quality level, learning competence, and material relatedness. Relatedness to e-learning is more important in increasing student motivation in learning, as can be seen from the correlation value which is more dominant in forming student satisfaction. The e-learning platform must have navigation that is easy for users to understand and use. Learning content must be well-designed and follow established learning standards. The use of Big Data technology in e-learning can have a significant impact on student satisfaction and the quality of learning. Future research can develop a more personal and adaptive e-learning platform, using Big Data technology as the basis for its development.
Breaking safety constraints in control systems can lead to potential risks, resulting in unexpected costs or catastrophic damage. Nevertheless, uncertainty is ubiquitous, even among similar tasks. In this paper, we de...
详细信息
This research aims to study the working principles of IOT devices or Internet of Things in order to promote the use of information technology systems, both hardware and software, with visually impaired people. rehabil...
详细信息
This research aims to study the working principles of IOT devices or Internet of Things in order to promote the use of information technology systems, both hardware and software, with visually impaired people. rehabilitation of persons with disabilities, enhancing the capacity or ability of persons with disabilities to improve their condition or or existing capabilities through the advancement of technology so that people with disabilities have the opportunity to work or live in society to the full potential of the researcher The concept of technology acceptance model (technology Acceptance Model or TAM) to help further develop This research shows the importance of information technology systems, both hardware and software, to visually impaired people, which is the basis for product development of healthcare service businesses in the future.
The absence of requirement documents or incompatibility of the requirement documents with existing software can be a problem in developing or maintaining software. Without knowing things that become requirements can c...
详细信息
Mostly Drugstores do not have any system that exclusively connect to access E-commerce system because the marketing concept of drugstores still use conventional store to sell their products. According to this situatio...
详细信息
暂无评论