Search results for "e learning"

showing 10 items of 2703 documents

Collecting and Using Students’ Digital Well-Being Data in Multidisciplinary Teaching

2018

This article examines how students (N=198; aged 13 to 17) experienced the new methods for sensor-based learning in multidisciplinary teaching in lower and upper secondary education that combine the use of new sensor technology and learning from self-produced well-being data. The aim was to explore how students perceived new methods from the point of view of their learning and did the teaching methods provide new information that could promote their own well-being. We also aimed to find out how to collect digital well-being data from a large number of students and how the collected big data set can be utilized to predict school success from the students’ well-being data by using machine lear…

Article SubjectoppiminenComputer scienceTeaching methodhyvinvointiBig dataMachine learningcomputer.software_genrelcsh:Education (General)EducationCorrelation03 medical and health sciences0302 clinical medicineMultidisciplinary approachta516Set (psychology)ta113studentsopiskelijatPoint (typography)business.industry05 social sciences050301 educationdigital well-being datadataMultilayer perceptronWell-beingArtificial intelligencelcsh:L7-991business0503 educationcomputermultidisciplinary teaching030217 neurology & neurosurgeryEducation Research International
researchProduct

Complexity reduction in efficient prototype-based classification

2006

Artificial Intelligencebusiness.industryComputer scienceSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessMachine learningcomputer.software_genrecomputerSoftwarePattern Recognition
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Real-time micro-expression analysis by artificial vision

2022

Human-computer interaction technologies focus more and more on the human being, whether it is on his identity, or on his physical and mental state. Significant progress has been made in the last few decades. However, the study of thoughts and emotions is still an underdeveloped field, but one that has begun to gain considerable interest. In this field, the analysis of facial expressions is the preferred treatment.Unlike a macro-expression, which is visible to the eye, a micro-expression is a type of involuntary facial expression that is extremely rapid and of very low intensity. The computer vision scientific community has been studying ways to automatically recognize micro-expressions usin…

Artificial intelligence[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingVision par ordinateurMachine learningComputer visionEmotional artificial intelligenceApprentissage automatiqueIntelligence artificielleIntelligence artificielle émotionnelle
researchProduct

Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation

2019

Abstract Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a method that works in three stages. First, the ExtraTrees classifier is used to select relevant features for each type of attack individually for each (ELM). Then, an ensemble of ELMs is used to detect each type of attack separately. Finally, the results of all ELMs are combined using a softmax layer to refine the results and increase the accuracy further. The intuition behind our system is that multi-class classification is quite difficult compared to binary classification. So, we…

Artificial intelligencelcsh:Computer engineering. Computer hardwareExtreme learning machineEnsemble methodsComputer scienceBinary numberlcsh:TK7885-7895Feature selection02 engineering and technologyIntrusion detection systemlcsh:QA75.5-76.95Machine learning0202 electrical engineering electronic engineering information engineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Multi layerExtreme learning machinebusiness.industryIntrusion detection system020206 networking & telecommunicationsPattern recognitionComputer Science ApplicationsBinary classificationFeature selectionSignal ProcessingSoftmax function020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligencebusinessClassifier (UML)EURASIP Journal on Information Security
researchProduct

Using machine learning to disentangle LHC signatures of Dark Matter candidates

2019

We study the prospects of characterising Dark Matter at colliders using Machine Learning (ML) techniques. We focus on the monojet and missing transverse energy (MET) channel and propose a set of benchmark models for the study: a typical WIMP Dark Matter candidate in the form of a SUSY neutralino, a pseudo-Goldstone impostor in the shape of an Axion-Like Particle, and a light Dark Matter impostor whose interactions are mediated by a heavy particle. All these benchmarks are tensioned against each other, and against the main SM background ($Z$+jets). Our analysis uses both the leading-order kinematic features as well as the information of an additional hard jet. We explore different representa…

Artificial neural network010308 nuclear & particles physicsbusiness.industryComputer sciencePhysicsQC1-999Dark matterFOS: Physical sciencesGeneral Physics and AstronomySupersymmetryMachine learningcomputer.software_genre01 natural sciencesConvolutional neural networkHigh Energy Physics - PhenomenologyHigh Energy Physics - Phenomenology (hep-ph)Robustness (computer science)0103 physical sciencesPrincipal component analysisProbability distributionArtificial intelligence010306 general physicsbusinessLight dark mattercomputerSciPost Physics
researchProduct

Assigning discounts in a marketing campaign by using reinforcement learning and neural networks

2009

In this work, RL is used to find an optimal policy for a marketing campaign. Data show a complex characterization of state and action spaces. Two approaches are proposed to circumvent this problem. The first approach is based on the self-organizing map (SOM), which is used to aggregate states. The second approach uses a multilayer perceptron (MLP) to carry out a regression of the action-value function. The results indicate that both approaches can improve a targeted marketing campaign. Moreover, the SOM approach allows an intuitive interpretation of the results, and the MLP approach yields robust results with generalization capabilities.

Artificial neural networkComputer scienceGeneralizationbusiness.industrymedia_common.quotation_subjectAggregate (data warehouse)General EngineeringMachine learningcomputer.software_genreComputer Science ApplicationsFunction approximationArtificial IntelligenceMultilayer perceptronReinforcement learningState (computer science)Artificial intelligenceFunction (engineering)businesscomputermedia_commonExpert Systems with Applications
researchProduct

Support Tool for the Combined Software/Hardware Design of On-Chip ELM Training for SLFF Neural Networks

2016

Typically, hardware implemented neural networks are trained before implementation. Extreme learning machine (ELM) is a noniterative training method for single-layer feed-forward (SLFF) neural networks well suited for hardware implementation. It provides fixed-time learning and simplifies retraining of a neural network once implemented, which is very important in applications demanding on-chip training. This study proposes the data flow of a software support tool in the design process of a hardware implementation of on-chip ELM learning for SLFF neural networks. The software tool allows the user to obtain the optimal definition of functional and hardware parameters for any application, and e…

Artificial neural networkComputer sciencebusiness.industry020208 electrical & electronic engineering02 engineering and technologyComputer Science ApplicationsData flow diagramSoftwareControl and Systems EngineeringGate arrayEmbedded system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSystem on a chipElectrical and Electronic EngineeringbusinessEngineering design processComputer hardwareInformation SystemsExtreme learning machineIEEE Transactions on Industrial Informatics
researchProduct

Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach

2020

The evolution of Internet of things (IoT) towards massive IoT in recent years has stimulated a surge of traffic volume among which a huge amount of traffic is generated in the form of massive machine type communications. Consequently, existing network infrastructure is facing challenges when handling rapidly growing traffic load, especially under bursty traffic conditions which may more often lead to congestion. By proactively predicting the occurrence of congestion, we can implement necessary means and conceivably avoid congestion. In this paper, we propose a machine learning (ML) based model for predicting successful preamble transmissions at a base station and subsequently forecasting th…

Artificial neural networkComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyMachine learningcomputer.software_genrePreambleBase station0508 media and communicationsRecurrent neural networkTransmission (telecommunications)Traffic volume0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Tabu and Scatter Search for Artificial Neural Networks

2003

In this paper we address the problem of training multilayer feed-forward neural networks. These networks have been widely used for both prediction and classification in many different areas. Although the most popular method for training these networks is back propagation, other optimization methods such as tabu search or scatter search have been applied to solve this problem. This paper presents a new training algorithm based on the tabu search methodology that incorporates elements for search intensification and diversification by utilizing strategic designs where other previous approaches resort to randomization. Our method considers context and search information, as it is provided by th…

Artificial neural networkComputer sciencebusiness.industryContext (language use)Machine learningcomputer.software_genreBackpropagationTabu searchPartial derivativeArtificial intelligencebusinessMetaheuristicGlobal optimizationcomputerSelection (genetic algorithm)
researchProduct