Early detection is crucial in improving patient outcomes and survival rates for stomach cancer. This research introduces a deep learning system employing Convolutional Neural Networks (CNN) to aid in the early detecti...
详细信息
Stress is one of the prevailing issues in today's world, deeply impacting the actual well-being of individuals. In this paper, we introduce an innovative method to detect stress that deviates from the mainstream a...
详细信息
This full paper research reports on the curriculum design and voluntary Institutional Review Board (IRB) approved student laboratory learning and surveys from a global cybersecurity embedded travel course. The Cyberse...
详细信息
ISBN:
(纸本)9798350351507
This full paper research reports on the curriculum design and voluntary Institutional Review Board (IRB) approved student laboratory learning and surveys from a global cybersecurity embedded travel course. The Cybersecurity in a Global Context embedded course is designed as a global spring break graduate and undergraduate enrichment program centered in Rome, Italy. The program curriculum was designed to expose students to classroom laboratory assignments, participate in related guest lectures, university site visits, and cybersecurity-related museum activities to enrich their understanding of international cybersecurity topics of relevance. The curriculum was designed for the graduate and under-graduate students to add breadth to their growth in knowledge extended from their classroom experience. Topics covered in the course include foundational cybersecurity and digital forensic concepts, network infrastructure security, and secure software and scripting development. The goal of the week was for students to submit assignments and participate in discussions within the four domains of knowledge. In the first two labs, students explored global topics including international criminal activities, the dark web, and networking concepts such as virtual private networks. In the third lab, students worked on securing portable WiFI routers. In the last labs, the students worked on securing the software running on the WIFI portable routers. The students worked in teams to complete the labs based on the classes they were enrolled into. A graduate student was a team captain of every team that consisted of 1-2 undergraduate students. Students were also asked to keep a daily journal for cybersecurity lessons learned from site visits, guest speakers, and laboratory assignments. These journals were transformed into blogs about their experience. Students were encouraged to publish their experience blog to raise awareness of international cybersecurity concerns. We report on the labor
Recent years have seen a breakthrough in object detection in computer vision thanks to the development of deep learning algorithms. Although neural approaches appear to perform on par with or even better than human ju...
详细信息
In recent years a new term related to GPT (Generative Pre-trained Transformer) has become very popular among professional society members who develop and use computing applications. This trend has inspired entrepreneu...
详细信息
ISBN:
(纸本)9781917204149
In recent years a new term related to GPT (Generative Pre-trained Transformer) has become very popular among professional society members who develop and use computing applications. This trend has inspired entrepreneurship in education in the following aspects: Academic - in the computerscience and Management Departments Non-academic - studies for high school pupils and for adults who wish to enrich their education. The purpose of these studies is to popularise science, technology, and art using innovative methods to make these subjects attractive. Academic entrepreneurship requires students to be innovative, namely, to create a project using their acquired professional skills. The work, called the final project, is a part of the students' academic requirements at universities. As a promoter of these projects, I have been giving the students proposals, suggestions, and inspiration for the subjects of their projects. The article mentions and describes a database with hundreds of recommendations for subjects for projects as well as projects completed by students who previously finished their final project. This project's database is used as a model for the current students. The database includes the project's hierarchical classification along with subsections, according to their theme, innovation level, and completeness, indicating their practical or theoretical properties. The following projects are a sample demonstrating the variety of the final projects, for example: "Analysing the voiceless languages", "Double buffer economic boiler", and "Creating the most consensual coalition". The second aspect of the entrepreneurship being developed is a series of lectures "The Popularisation of the science and the Art". This collection of lectures includes an innovative method for preparing and presenting the lectures, connecting attractively the way in which science and art are popularised together for an audience in a wide spectrum of society. The Power-Point presentations
This paper aims to review the current advances in healthcare uses of machine learning (ML) for the diagnosis of numerous diseases using different classification models. It proposes an efficient mechanism for multi-dis...
详细信息
The digital convergence of the Internet of Things and machine learning has therefore redefined precision agriculture with respect to productivity and sustainability. This work therefore proposes a smart agriculture sy...
详细信息
Plant diseases can have a detrimental effect on crop yield and quality, posing significant challenges to global food security. Early and accurate disease detection is essential for timely intervention and mitigation. ...
详细信息
The Internet Service Providers (ISP), and their structures are at high risk with the growing quantity and complexity of cyber threats. The growth of quantum computing further elevates the risks and challenges especial...
详细信息
Unmanned vehicles, such as drones, have surged in popularity in recent years. Swarms of these vehicles offer new opportunities in applications such as agriculture, weather monitoring and natural events management. How...
详细信息
暂无评论