Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs...
详细信息
ISBN:
(数字)9798331542634
ISBN:
(纸本)9798331542641
Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs by integrating advanced AI capabilities for personalized support and adaptive learning. The platform supports user registration and authentication, course and lesson management, and offers interactive features like AI-driven chat support. In this study, we show the importance of creating user-friendly online learning platforms with the implementation of modern AI trends. The development and testing of this platform is ongoing to determine the adaptation of the system to different learning styles.
Machine learning technique is full-fledged as a boosting sector to develop modeling and forecasting of complex time series observations in the present environment. This study made an attempt to inspect the future perf...
详细信息
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various fea...
详细信息
Lip reading is a technique that aims to understand spoken words by analyzing people's lip movements. Deep learning algorithms are used as a powerful tool for detecting and recognizing lip movements more accurately...
详细信息
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits frequently capitalize on human psychology, trust, and a lack of vigilance to attain unauthorized entry to networks, systems, or data. In contrast to traditional social engineering tactics that center on psychological manipulation, technical social engineering attacks employ technological means and strategies to manipulate and beguile individuals. The paper presents an attempt to detect social engineering attacks. The approach utilized four machine learning algorithms (decision tree, random forest, K-nearest neighbor, and extreme gradient boosting). The analysis is centered on data collected from network hosts, which may serve as indicators of a potential social engineering attack. The empirical results demonstrated high detection accuracy.
Remote monitoring of objects or technological processes is used in many industries and service-oriented companies to obtain up-to-date information about the state of things or technical processes. The article is devot...
详细信息
This article discusses the use of fuzzy logic and a neural network to predict the demand for pharmaceutical products in a distributed network, in conditions of insufficient information, a large assortment and the infl...
详细信息
In the present article, we have considered the issue of selection of potential locations of trade objects as a multi-factor decision-making in the conditions of uncertainty by applying the theory of fuzzy sets. Exampl...
详细信息
Selection of insulation material and determination of its thickness are the two most important parameters that prevent heat loss. Too much thickness complicates the price and use. The low coefficient of thermal conduc...
详细信息
Long-term predictions of time series is a task with multiple applications. Exploiting neural networks for such problem has not been studied enough for financial purposes. An empirical study of specific cases with real...
详细信息
暂无评论