AI's revolutionary potential in higher education is examined in this proposal, including how it could revolutionize teaching, learning, administration, and research. Adaptive learning platforms, intelligent tutori...
详细信息
ISBN:
(数字)9798331508456
ISBN:
(纸本)9798331508463
AI's revolutionary potential in higher education is examined in this proposal, including how it could revolutionize teaching, learning, administration, and research. Adaptive learning platforms, intelligent tutoring systems, and virtual learning assistants may change how students learn by improving engagement, providing quick feedback, and enabling tailored learning. The suggested process includes preprocessing, feature extraction, and model training. Preprocessing involves de-anonymizing, tokenizing, and removing punctuation, spaces, and numbers before analysis. The linear transformation method PCA extracts features. Training the systems uses the RF -SVM approach, which combines the advantages of RF and SVM. The suggested RF -SVM model beats two RF and SVM models with an average accuracy of 90.39 *** improves resource use, strategic decision-making, and research capacity in university management. The RF-SVM model's success in academia highlights the practicality of AI-driven solutions.
The ubiquity of the Internet of Things (IoT) in a vast range of consumer applications is unparalleled. Unfortunately, despite the benefits of IoT, its widespread integration comes with significant security challenges....
The ubiquity of the Internet of Things (IoT) in a vast range of consumer applications is unparalleled. Unfortunately, despite the benefits of IoT, its widespread integration comes with significant security challenges. Considering IoT devices' capability to interact with the physical environment, there is an urgent need for effective anomaly detection. The state-of-the-art anomaly detection method, HAWatcher, models the normal behaviors of smart homes with inter-device correlations and demonstrates great results. Nonetheless, it is limited to capturing only simple one-to-one correlations between two events or states, which undermines its capability to detect anomalies in more complicated environments. To address this issue, we present a novel correlation discovering method to mine complex two-to-one correlations in such complicated IoT-enabled environments. We conduct experiments over two weeks on four smart home testbeds and obtain 70 two-to-one correlations. The correlations are applied to 9 anomaly scenarios, which show significant improvements in detecting anomalies over one-to-one correlations.
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE...
详细信息
ISBN:
(数字)9798350379365
ISBN:
(纸本)9798350379372
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AES-128, AES-256, ChaCha20, RSA (1024-bit, 2048-bit, and 4096-bit), SHA256, SHA512, and HMAC-SHA256 were tested in both standalone and emulated environments. The primary objective was to evaluate the performance and resource consumption of these protocols, focusing on their encryption and hashing efficiency. Key innovations include the comparative analysis of resource consumption and performance efficiency across diverse cryptographic operations, under both real-world and emulated conditions. By identifying protocols like ChaCha20 for high efficiency and minimal resource usage, and RSA 4096-bit for enhanced security at higher computational costs, this study provides actionable insights into the trade-offs between security and performance. These findings offer a foundational reference for selecting optimized cryptographic protocols, advancing IoT malware defense strategies through informed decision-making.
We survey eight recent works by our group, involving the successful blending of evolutionary algorithms with machine learning and deep learning: 1. Binary and Multinomial Classification through Evolutionary Symbolic R...
详细信息
Smart speakers bring convenience to people's daily lives. However, various attacks can be launched against smart speakers to execute malicious commands, which may cause serious safety or security issues. The exist...
Smart speakers bring convenience to people's daily lives. However, various attacks can be launched against smart speakers to execute malicious commands, which may cause serious safety or security issues. The existing solutions against sophisticated attacks such as voice replay attacks and voice synthesis attacks require intrusive modifications of the smart speaker hardware and/or software, which are impractical for general users. In this work, we present a novel security scheme- VoiceGuard that can effectively detect and block unauthorized voice commands to smart speakers. VoiceGuard does not require any modification to smart speakers' hardware or software. We implement a prototype of VoiceGuard on two popular smart speakers: Amazon Echo Dot and Google Home Mini, and evaluate the scheme in three real-world testbeds, which include both single-user and multi-user scenarios. The experimental results show that VoiceGuard achieves an accuracy of 97% in blocking malicious voice commands issued by illegitimate sources while having a negligible impact on the user experience.
Railway transport safety is directly connected with the condition of railway tracks and also the condition of railway wheels’ surface. One of the main reasons for abnormal situations on railways are various defects s...
Railway transport safety is directly connected with the condition of railway tracks and also the condition of railway wheels’ surface. One of the main reasons for abnormal situations on railways are various defects such as irregularities of a railway track. Thus, we need to estimate the length of short and impulse irregularities. It is also important to carry out joint analysis of vibration acceleration signals recorded by accelerometers in order to study types and sizes of railway track irregularities.
The outbreak of the coronavirus disease (COVID-19) has had a profound impact on education worldwide. The rise of remote learning is one of the most significant changes in this regard, as many schools and universities ...
The outbreak of the coronavirus disease (COVID-19) has had a profound impact on education worldwide. The rise of remote learning is one of the most significant changes in this regard, as many schools and universities were forced to close down by regional health authorities. This has also caused people to become more conservative in trade-offs between healthcare and education. Google Trends is the most common tool for analyzing online search behaviors. It is a free resource that provides information on the trends and changes in users' online interests over time based on certain terms and subjects. The online search queries on Google can be used to assess users' behaviors concerning online learning to forecast their choices regarding online education. This paper examines the frequency of users' web searches for online communication tools, courses, and learning terms. We statistically compared users in the Middle East and North Africa regions by using the volumes of searches recorded on Google Trends from January 2016 to August 2022. Moreover, we used machine learning techniques to identify differences among the keywords used. The findings statistically show that COVID-19 has led to an increase in the extent of students' attention to and interest in online learning.
Street lights currently use more energy than other types of lighting because of an inefficient mechanism that makes the bulbs use a lot of electricity. The suggested approach uses various sensors on intelligent street...
Street lights currently use more energy than other types of lighting because of an inefficient mechanism that makes the bulbs use a lot of electricity. The suggested approach uses various sensors on intelligent streetlights to keep an eye on and manage the lights. It has sensors for measuring temperature, brightness, and power that control dimming levels and keep track of status. One Zigbee network serves as the connection point for these lights. In the modification, a cloud- and IoT-based installation was made. Through Zigbee -based data transmission, sensor values are recorded on a distant server known as the Cloud. Additionally, it lowers electricity theft. We include a trash can notice in addition to this street light idea. When the garbage can is whole, a machine automatically notifies the business as people approach the sun, and the brightness of the street lights changes or is increased.
The construction of large open knowledge bases (OKBs) is integral to many applications in the field of mobile computing. Noun phrases and relational phrases in OKBs often suffer from redundancy and ambiguity, which ca...
详细信息
The urgency of climate change has highlighted the need for sustainable road construction materials, replacing the conventional asphalt that significantly contributes to global warming and the urban heat island effect....
详细信息
暂无评论