Search results for "420"
showing 10 items of 422 documents
A new paradigm for pattern classification: Nearest Border Techniques
2013
Published version of a chapter in the book: AI 2013: Advances in Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-03680-9_44 There are many paradigms for pattern classification. As opposed to these, this paper introduces a paradigm that has not been reported in the literature earlier, which we shall refer to as the Nearest Border (NB) paradigm. The philosophy for developing such a NB strategy is as follows: Given the training data set for each class, we shall first attempt to create borders for each individual class. After that, we advocate that testing is accomplished by assigning the test sample to the class whose border it lies closest to…
Education Students’ Use of Collaborative Writing Tools in Collectively Reflective Essay Papers
2014
Published version of an article in the journal: Journal of Information Technology Education: Research. Also available from the publisher at: http://www.jite.org/documents/Vol13/JITEv13ResearchP091-120Brodahl0463.pdf Open Access Google Docs and EtherPad are Web 2.0 tools providing opportunity for multiple users to work online on the same document consecutively or simultaneously. Over the last few years a number of research papers on the use of these collaborative tools in a teaching and learning environment have been published. This work builds on that of Brodahl, Hadjerrouit, and Hansen (2011) expanding its case study. The theoretical framework is the same as the one underlying Brodahl et a…
Collaborative writing with web 2.0 technologies: education students' perceptions
2011
Published version of an article from the journal: Journal of Information Technology Education. Also available from the publisher: http://jite.org/documents/Vol10/JITEv10IIPp073-103Brodahl948.pdf Executive Summary Web 2.0 technologies are becoming popular in teaching and learning environments. Among them several online collaborative writing tools, like wikis and blogs, have been integrated into educational settings. Research has been carried out on a wide range of subjects related to wikis, while other, comparable tools like Google Docs and EtherPad remain largely unexplored in the literature. This work presents a case study investigating education students' perceptions of collaborative writ…
Enhancing Attention’s Explanation Using Interpretable Tsetlin Machine
2022
Explainability is one of the key factors in Natural Language Processing (NLP) specially for legal documents, medical diagnosis, and clinical text. Attention mechanism has been a popular choice for such explainability recently by estimating the relative importance of input units. Recent research has revealed, however, that such processes tend to misidentify irrelevant input units when explaining them. This is due to the fact that language representation layers are initialized by pre-trained word embedding that is not context-dependent. Such a lack of context-dependent knowledge in the initial layer makes it difficult for the model to concentrate on the important aspects of input. Usually, th…
Doppler Shift Characterization of Wideband Mobile Radio Channels
2019
The prevailing approach for characterizing the Doppler shift (DS) of mobile radio channels assumes the transmission of an unmodulated carrier. This consideration is valid for the analysis of narrowband channels, but its pertinence is questionable in regards to the modeling of wideband channels. In this correspondence, we redefine the DS from a time-frequency analysis perspective that does not depend on the aforementioned assumption. We systematically demonstrate that the DS can be characterized by the instantaneous frequency of the channel transfer function. This generic definition makes evident a fundamental aspect of the DS that is seldom acknowledged, namely, the DS is a frequency-varyin…
Classes of sum-of-cisoids processes and their statistics for the modeling and simulation of mobile fading channels
2013
Published version of an article in the journal: EURASIP Journal on Wireless Communications and Networking. Also available from the publisher at: http://dx.doi.org/10.1186/1687-1499-2013-125 Open access In this paper, we present a fundamental study on the stationarity and ergodicity of eight classes of sum-of-cisoids (SOC) processes for the modeling and simulation of frequency-nonselective mobile Rayleigh fading channels. The purpose of this study is to determine which classes of SOC models enable the design of channel simulators that accurately reproduce the channel’s statistical properties without demanding information on the time origin or the time-consuming computation of an ensemble ave…
Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment
2022
The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security in…
Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study
2021
Following the growing popularity of social commerce sites, there is an increased interest in understanding how consumers decide what products to purchase based on the available information. Consumers nowadays are confronted with the task of assessing marketer-generated (MGC) as well as user-generated information (UGC) in a range of different forms to make informed purchase-related decisions. This study examines the information types and forms that influence consumers in their decision-making process on social commerce. Building on uses and gratifications and dual-process theories, we distinguish between marketer and user generated content, and differentiate formats into informational and no…
Evaluation of Deep Learning and Conventional Approaches for Image Recaptured Detection in Multimedia Forensics
2022
Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicing, copy-move, removal, or image retouching. It is significant to develop secure and automatic techniques to distinguish real and recaptured images without prior knowledge. Image manipulation traces can be hidden using recaptured images. For this reason, being able to detect recapture images becomes a hot research topic for a forensic analyst. The attacker can recapture the manipulated images to fool image forensic system. As far as we know, ther…
Real-time people counting system using a single video camera
2008
This is the copy of journal's version originally published in Proc. SPIE 6811. Reprinted with permission of SPIE: http://spie.org/x10.xml?WT.svl=tn7 There is growing interest in video-based solutions for people monitoring and counting in business and security applications. Compared to classic sensor-based solutions the video-based ones allow for more versatile functionalities, improved performance with lower costs. In this paper, we propose a real-time system for people counting based on single low-end non-calibrated video camera. The two main challenges addressed in this paper are: robust estimation of the scene background and the number of real persons in merge-split scenarios. The latter…