This research introduces the application of an innovative bio-inspired metaheuristic technique, termed the Crow Search Algorithm (CSA), to model a crucial industrial process - hot rolling manufacturing. Inspired by th...
详细信息
Nowadays, the integration of blockchain and edge computing has become important in computerscience due to the significant advantages it can bring to a range of real-world applications. By combining the strengths of b...
详细信息
作者:
Mi, Lam XinHoon, Saw SeowWang, Khor SiakHui, Saw SeowUtar
Faculty of Information and Communication Technology Dept. of Information Systems Perak Malaysia Utar
Dr. WLT-CRCD Utar Sg. Long Faculty of Science Dept. of Allied Health Sciences Perak Malaysia Utar
Faculty of Information and Communication Technology Department of Computer Science Perak Malaysia
The absence of an independent learning platform to address femoral shaft fractures poses challenges in understanding and classifying these fractures. The existing anatomy platforms, such as 3D interactive anatomical a...
详细信息
Human Pose Estimation is a computer vision technique utilized in various fields such as healthcare, security, and sports to detect the pose of single or multi-person utilizing various machine learning and deep learnin...
详细信息
Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity ...
详细信息
Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity and *** managing the deluge of incoming bug reports faces time and resource constraints from the development team and delays the resolu-tion of critical ***,bug report prioritization is *** study pro-poses a new model for bug prioritization based on average one dependence estimator;it prioritizes bug reports based on severity,which is determined by the number of *** more the number of attributes,the more the *** proposed model is evaluated using precision,recall,F1-Score,accuracy,G-Measure,and Matthew’s correlation *** of the proposed model are compared with those of the support vector machine(SVM)and Naive Bayes(NB)*** and Mozilla datasetswere used as the sources of bug *** proposed model improved the bug repository management and out-performed the SVM and NB ***,the proposed model used a weaker attribute independence supposition than the former models,thereby improving prediction accuracy with minimal computational cost.
Learning analytics is a rapidly evolving research discipline that uses theinsights generated from data analysis to support learners as well as optimize boththe learning process and environment. This paper studied stud...
详细信息
Learning analytics is a rapidly evolving research discipline that uses theinsights generated from data analysis to support learners as well as optimize boththe learning process and environment. This paper studied students’ engagementlevel of the Learning Management System (LMS) via a learning analytics tool,student’s approach in managing their studies and possible learning analytic methods to analyze student data. Moreover, extensive systematic literature review(SLR) was employed for the selection, sorting and exclusion of articles fromdiverse renowned sources. The findings show that most of the engagement inLMS are driven by educators. Additionally, we have discussed the factors inLMS, causes of low engagement and ways of increasing engagement factorsvia the Learning Analytics approach. Nevertheless, apart from recognizing theLearning Analytics approach as being a successful method and technique for analyzing the LMS data, this research further highlighted the possibility of mergingthe learning analytics technique with the LMS engagement in every institution asbeing a direction for future research.
Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from *** this s...
详细信息
Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from *** this scenario,the rising popularity of Online Social Networks(OSN)is under threat from spammers for which effective spam bot detection approaches should be *** studies have developed different approaches for the detection of spam bots in *** those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning(DL)models needs to be *** this motivation,the current research article proposes a Spam Bot Detection technique using Hybrid DL model abbreviated as *** proposed SBD-HDL technique focuses on the detection of spam bots that exist in *** technique has different stages of operations such as pre-processing,classification,and parameter ***,SBD-HDL technique hybridizes Graph Convolutional Network(GCN)with Recurrent Neural Network(RNN)model for spam bot classification *** order to enhance the detection performance of GCN-RNN model,hyperparameters are tuned using Lion Optimization Algorithm(LOA).Both hybridization of GCN-RNN and LOA-based hyperparameter tuning process make the current work,a first-of-its-kind in this *** experimental validation of the proposed SBD-HDL technique,conducted upon benchmark dataset,established the supremacy of the technique since it was validated under different measures.
Raising the students' academic performance and improving the overall quality of education is an important goal of our society. With the exploding development of information technologies, Educational Data Mining ha...
详细信息
An exponential growth in advanced technologies has resulted in the exploration of Ocean *** has paved the way for new opportunities that can address questions relevant to diversity,uniqueness,and difficulty of marine ...
详细信息
An exponential growth in advanced technologies has resulted in the exploration of Ocean *** has paved the way for new opportunities that can address questions relevant to diversity,uniqueness,and difficulty of marine *** Wireless Sensor Networks(UWSNs)are widely used to leverage such opportunities while these networks include a set of vehicles and sensors to monitor the environmental *** this scenario,it is fascinating to design an automated fish detection technique with the help of underwater videos and computer vision techniques so as to estimate and monitor fish biomass in water *** models have been developed earlier for fish ***,they lack robustness to accommodate considerable differences in scenes owing to poor luminosity,fish orientation,structure of seabed,aquatic plantmovement in the background and distinctive shapes and texture of fishes from different *** this motivation,the current research article introduces an Intelligent Deep Learning based Automated Fish Detection model for UWSN,named IDLAFD-UWSN *** presented IDLAFD-UWSN model aims at automatic detection of fishes from underwater videos,particularly in blurred and crowded ***-UWSN model makes use of Mask Region Convolutional Neural Network(Mask RCNN)with Capsule Network as a baseline model for fish ***,in order to train Mask RCNN,background subtraction process using GaussianMixtureModel(GMM)model is *** model makes use of motion details of fishes in video which consequently integrates the outcome with actual image for the generation of fish-dependent candidate ***,Wavelet Kernel Extreme Learning Machine(WKELM)model is utilized as a classifier *** performance of the proposed IDLAFD-UWSN model was tested against benchmark underwater video dataset and the experimental results achieved by IDLAFD-UWSN model were promising in comparison with other state-of-the-art methods under differe
While large language models (LLMs) show promise for various tasks, their performance in compound aspect-based sentiment analysis (ABSA) tasks lags behind fine-tuned models. However, the potential of LLMs fine-tuned fo...
详细信息
暂无评论