Search results for "e learning"
showing 10 items of 2703 documents
Collecting and Using Students’ Digital Well-Being Data in Multidisciplinary Teaching
2018
This article examines how students (N=198; aged 13 to 17) experienced the new methods for sensor-based learning in multidisciplinary teaching in lower and upper secondary education that combine the use of new sensor technology and learning from self-produced well-being data. The aim was to explore how students perceived new methods from the point of view of their learning and did the teaching methods provide new information that could promote their own well-being. We also aimed to find out how to collect digital well-being data from a large number of students and how the collected big data set can be utilized to predict school success from the students’ well-being data by using machine lear…
Complexity reduction in efficient prototype-based classification
2006
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
Real-time micro-expression analysis by artificial vision
2022
Human-computer interaction technologies focus more and more on the human being, whether it is on his identity, or on his physical and mental state. Significant progress has been made in the last few decades. However, the study of thoughts and emotions is still an underdeveloped field, but one that has begun to gain considerable interest. In this field, the analysis of facial expressions is the preferred treatment.Unlike a macro-expression, which is visible to the eye, a micro-expression is a type of involuntary facial expression that is extremely rapid and of very low intensity. The computer vision scientific community has been studying ways to automatically recognize micro-expressions usin…
Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation
2019
Abstract Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a method that works in three stages. First, the ExtraTrees classifier is used to select relevant features for each type of attack individually for each (ELM). Then, an ensemble of ELMs is used to detect each type of attack separately. Finally, the results of all ELMs are combined using a softmax layer to refine the results and increase the accuracy further. The intuition behind our system is that multi-class classification is quite difficult compared to binary classification. So, we…
Using machine learning to disentangle LHC signatures of Dark Matter candidates
2019
We study the prospects of characterising Dark Matter at colliders using Machine Learning (ML) techniques. We focus on the monojet and missing transverse energy (MET) channel and propose a set of benchmark models for the study: a typical WIMP Dark Matter candidate in the form of a SUSY neutralino, a pseudo-Goldstone impostor in the shape of an Axion-Like Particle, and a light Dark Matter impostor whose interactions are mediated by a heavy particle. All these benchmarks are tensioned against each other, and against the main SM background ($Z$+jets). Our analysis uses both the leading-order kinematic features as well as the information of an additional hard jet. We explore different representa…
Assigning discounts in a marketing campaign by using reinforcement learning and neural networks
2009
In this work, RL is used to find an optimal policy for a marketing campaign. Data show a complex characterization of state and action spaces. Two approaches are proposed to circumvent this problem. The first approach is based on the self-organizing map (SOM), which is used to aggregate states. The second approach uses a multilayer perceptron (MLP) to carry out a regression of the action-value function. The results indicate that both approaches can improve a targeted marketing campaign. Moreover, the SOM approach allows an intuitive interpretation of the results, and the MLP approach yields robust results with generalization capabilities.
Support Tool for the Combined Software/Hardware Design of On-Chip ELM Training for SLFF Neural Networks
2016
Typically, hardware implemented neural networks are trained before implementation. Extreme learning machine (ELM) is a noniterative training method for single-layer feed-forward (SLFF) neural networks well suited for hardware implementation. It provides fixed-time learning and simplifies retraining of a neural network once implemented, which is very important in applications demanding on-chip training. This study proposes the data flow of a software support tool in the design process of a hardware implementation of on-chip ELM learning for SLFF neural networks. The software tool allows the user to obtain the optimal definition of functional and hardware parameters for any application, and e…
Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach
2020
The evolution of Internet of things (IoT) towards massive IoT in recent years has stimulated a surge of traffic volume among which a huge amount of traffic is generated in the form of massive machine type communications. Consequently, existing network infrastructure is facing challenges when handling rapidly growing traffic load, especially under bursty traffic conditions which may more often lead to congestion. By proactively predicting the occurrence of congestion, we can implement necessary means and conceivably avoid congestion. In this paper, we propose a machine learning (ML) based model for predicting successful preamble transmissions at a base station and subsequently forecasting th…
Tabu and Scatter Search for Artificial Neural Networks
2003
In this paper we address the problem of training multilayer feed-forward neural networks. These networks have been widely used for both prediction and classification in many different areas. Although the most popular method for training these networks is back propagation, other optimization methods such as tabu search or scatter search have been applied to solve this problem. This paper presents a new training algorithm based on the tabu search methodology that incorporates elements for search intensification and diversification by utilizing strategic designs where other previous approaches resort to randomization. Our method considers context and search information, as it is provided by th…