The spread of the Corona Virus pandemic on a global scale had a great impact on the trend towards e-learning. In the virtual exams the student can take his exams online without any papers, in addition to the correctio...
详细信息
The spread of the Corona Virus pandemic on a global scale had a great impact on the trend towards e-learning. In the virtual exams the student can take his exams online without any papers, in addition to the correction and electronic monitoring of the exams. Tests are supervised and controlled by a camera and proven cheat-checking tools. This technology has opened the doors of academic institutions for distance learning to be wide spread without any problems at all. In this paper, a proposed model was built by linking a computer network using a server/client model because it is a system that distributes tasks between the two. The main computer that acts as a server (exam observer) is connected to a group of sub-computers (students) who are being tested and these devices are considered the set of clients. The proposed student face recognition system is run on each computer (client) in order to identify and verify the identity of the student. When another face is detected, the program sends a warning signal to the server. Thus, the concerned student is alerted. This mechanism helps examinees reduce cheating cases in early time. The results obtained from the face recognition showed high accuracy despite the large number of students' faces. The performance speed was in line with the test performance requirements, handling 1,081 real photos and adding 960 photos.
In this paper we introduce the notion of neutrosophic fuzzy bitopological ideals. The concept of neutrosophic fuzzy pairwise local function is also introduced here by utilizing the neutrosophic quasi-coincident neighb...
详细信息
Decision tree algorithms are one of the most popular methods in machine learning. However, most decision tree algorithms do not assume a stochastic model behind data. On the other hand, a meta-tree was recently propos...
ISBN:
(数字)9784885523519
ISBN:
(纸本)9798331533335
Decision tree algorithms are one of the most popular methods in machine learning. However, most decision tree algorithms do not assume a stochastic model behind data. On the other hand, a meta-tree was recently proposed as a stochastic model with a tree structure. The prediction under the assumption of the meta-tree is decided using Bayesian decision theory. Although the optimal prediction can be calculated with an assumption of a known meta-tree, an approximation is necessary to obtain a prediction under the problem setting of an unknown meta-tree because of the marginalization of all possible meta-trees. In this paper, we propose an approximation method, where a subset of meta-trees is sequentially constructed, and the prediction is made by weighting the meta-trees. For the approximation, we clarify the approaches of constructing the subset and making predictions with weighted meta-trees. We also examine the effectiveness of the approaches in an experiment using synthetic data. In addition, we conduct an experiment on benchmark data to confirm the performance of the proposal.
The paper aims to represent an autonomous car prototype using the Raspberry Pi as a processing chip. The pi-camera module provides necessary data from the real world to the car, which then passes the data on to the ra...
详细信息
The paper aims to represent an autonomous car prototype using the Raspberry Pi as a processing chip. The pi-camera module provides necessary data from the real world to the car, which then passes the data on to the raspberry-pi. The car can follow a given path safely and intelligently, thus avoiding the risk of human errors by responding to the real-time curve.
While numerous methods have been proposed for computing distances between probability distributions in Euclidean space, relatively little attention has been given to computing such distances for distributions on graph...
详细信息
The Internet of Vehicles (IoV) is a network of vehicles that are connected through the Internet using communication protocols. However, this raises concerns about security and privacy. The vulnerability of object netw...
The Internet of Vehicles (IoV) is a network of vehicles that are connected through the Internet using communication protocols. However, this raises concerns about security and privacy. The vulnerability of object networks has been highlighted in recent reports on cybernetics, and attacks on these networks could pose significant dangers to data integrity. To avoid this, security measures such as resistance to attacks, data authenticity, access control, and privacy must be integrated. The limited capabilities of IoT objects in terms of processing power, memory, bandwidth, and energy have led to the creation and redesign of protocols and architectures that meet the specific needs of these networks. One such protocol is the Message Queue Telemetry Transport (MQTT), which uses a Publish/Subscribe methodology and small amounts of bandwidth. To address security concerns, the paper proposes using the lightweight cryptographic techniques ASCON and GIFT-COFB, which could be useful in securing communication and data exchange in IoV sensor networks.
With the growth of online shopping, organizations should update their portals and websites in response to changing conditions and competitors' actions. To attract and retain online customers, various tools such as...
详细信息
Detecting fraudulent transactions presents two primary obstacles, the presence of imbalanced datasets and the sheer volume of feature categories. The scarcity of fraudulent instances within the dataset often results i...
详细信息
Multimodal Sentiment Analysis (MSA) has recently become a centric research direction for many real-world applications. This proliferation is due to the fact that opinions are central to almost all human activities and...
详细信息
RFID (Radio Frequency Identification) is a technology that permits to identify objects with a radio frequency field for few meters distance. It is applied in several fields such as traceability, logistics, military, s...
详细信息
暂无评论