21 research outputs found

    AISAR: Artificial Intelligence-Based Student Assessment and Recommendation System for E-Learning in Big Data

    No full text
    Educational systems have advanced with the use of electronic learning (e-learning), which is a promising solution for long-distance learners. Students who engage in e-learning can access tests and exams online, making education more flexible and accessible. This work reports on the design of an e-learning system that makes recommendations to students to improve their learning. This artificial intelligence-based student assessment and recommendation (AISAR) system consists of score estimation, clustering, performance prediction, and recommendation. In addition, the importance of student authentication is recognised in situations in which students must authenticate themselves prior to using the e-learning system using their identity, password, and personal identification number. Individual scores are determined using a recurrent neural network (RNN) based on student engagement and examination scores. Then, a density-based spatial clustering algorithm (DBSCAN) using Mahalanobis distance clustering is implemented to group students based on their obtained score values. The constructed clusters are validated by estimating purity and entropy. Student performance is predicted using a threshold-based MapReduce (TMR) procedure from the score-based cluster. When predicting student performance, students are classified into two groups: average and poor, with the former being divided into below- and above-average students and the latter into poor and very poor students. This categorisation aims to provide useful recommendations for learning. A recommendation reinforcement learning algorithm, the rule-based state–action–reward–state–action (R-SARSA) algorithm, is incorporated for evaluation. Students were required to work on their subjects according to the provided recommendations. This e-learning recommendation system achieves better performance in terms of true-positives, false-positives, true-negatives, false-negatives, precision, recall, and accuracy

    A Fault-Tolerant Sharding Mechanism for Resilience and Scalability in Blockchain Using Backup Pool

    No full text
    With the development of blockchain technology, an increasing number of devices are joining the network and generating numerous transactions, which pose significant performance and scalability challenges to blockchain networks. Sharding technology is one solution that improves throughput by parallelising transaction validation and block generation, thereby alleviating this challenge. However, during the process of dividing shard groups in large-scale networks, the uneven distribution of malicious nodes or dynamic changes in joined nodes may lead to failures in the availability and liveness of shard groups. This paper proposes an enhanced sharding blockchain system that improves fault tolerance and reliability to ensure high shard group performance, scalability, and reliability. We also propose the concept of a backup pool and achieve the detection and recovery of faulty shards through pre-deployed backup pool nodes and redesigned consensus algorithms. After a thorough security analysis, we conclude that the proposed sharding blockchain system can increase the Resilience of shard groups from 33.3% to 66.6%. Additionally, we evaluate the proposed system, and the results show that it ensures the security, reliability, and high performance of sharding while increasing the scalability of the system’s network nodes from 104 to 106 compared to existing sharding blockchains.</p

    Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment

    No full text
    Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for IoT devices, one that considers secret keys, geographical location, and physically unclonable function (PUF). Proof-of-authentication (PoAh) and elliptic curve Diffie–Hellman are followed for lightweight and low latency support. Second-level authentication for IoT users, which are sub-categorized into four levels, each defined by specific factors such as identity, password, and biometrics. The first level involves a matrix-based password; the second level utilizes the elliptic curve digital signature algorithm (ECDSA); and levels 3 and 4 are secured with iris and finger vein, providing comprehensive and robust authentication. We deployed fuzzy logic to validate the authentication and make the system more robust. The 2L-MFA model significantly improves performance, reducing registration, login, and authentication times by up to 25%, 50%, and 25%, respectively, facilitating quicker cloud access post-authentication and enhancing overall efficiency

    Machine Learning Techniques for Speech Recognition using the Magnitude

    No full text
    Machine learning consists of supervised and unsupervised learning among which supervised learning is used for the speech recognition objectives. Supervised learning is the Data mining task of inferring a function from labeled training data. Speech recognition is the current trend that has gained focus over the decades. Most automation technologies use speech and speech recognition for various perspectives. This paper demonstrates an overview of major technological standpoint and gratitude of the elementary development of speech recognition and provides impression method has been developed in every stage of speech recognition using supervised learning. The project will use DNN to recognize speeches using magnitudes with large datasets. </p

    Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction

    No full text
    Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, and secure environments. However, challenges such as privacy, bias, and data limitations persist. E-FedCloud aims to address these issues by providing more agile, personalised, and secure e-learning experiences. This study introduces E-FedCloud, an AI-assisted, adaptive e-learning system that automates personalised recommendations and tracking, thereby enhancing student performance. It employs federated learning-based authentication to ensure secure and private access for both course instructors and students. Intelligent Software Agents (ISAs) evaluate weekly student engagement using the Shannon Entropy method, classifying students into either engaged or not-engaged clusters. E-FedCloud utilises weekly engagement status, demographic information, and an innovative DRL-based early warning system, specifically ID2QN, to predict the performance of not-engaged students. Based on these predictions, the system categorises students into three groups: risk of dropping out, risk of scoring lower in the final exam, and risk of failing the end exam. It employs a multi-disciplinary ontology graph and an attention-based capsule network for automated, personalised recommendations. The system also integrates performance tracking to enhance student engagement. Data are securely stored on a blockchain using the LWEA encryption method

    A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks

    No full text
    The consensus mechanism is a core component of Blockchain technology, allowing thousands of nodes to agree on a single and consistent view of the Blockchain. A carefully selected consensus mechanism can provide attributes such as fault tolerance and immutability to an application. The Internet of Things (IoT) is a use case that can take advantage of these unique Blockchain properties. IoT devices are commonly implemented in sensitive domains such as health, smart cities, and supply chains. Resilience and data integrity are important for these domains, as failures and malicious data tampering could be detrimental to the systems that rely on these IoT devices. Additionally, Blockchains are well suited for decentralised networks and networks with high churn rates. A difficulty involved with applying Blockchain technology to the IoT is the lack of computational resources. This means that traditional consensus mechanisms like Proof of Work (PoW) are unsuitable. In this paper, we will compare several popular consensus mechanisms using a set of criteria, with the aim of understanding which consensus mechanisms are suitable for deployment in the IoT, and what trade-offs are required. We show that there are opportunities for both PoW and PoS to be implemented in the IoT, with purpose-made IoT consensus mechanisms like PoSCS and Microchain. Our analysis shows that Microchain and PoSCS have characteristics that are well suited for IoT consensus

    Data-driven Approach for State Prediction and Detection of False Data Injection Attacks in Smart Grid

    No full text
    In a smart grid, state estimation (SE) is a very important component of energy management system. Its main functions include system SE and detection of cyber anomalies. Recently, it has been shown that conventional SE techniques are vulnerable to false data injection (FDI) attack, which is a sophisticated new class of attacks on data integrity in smart grid. The main contribution of this paper is to propose a new FDI attack detection technique using a new data-driven SE model, which is different from the traditional weighted least square based SE model. This SE model has a number of unique advantages compared with traditional SE models. First, the prediction technique can better maintain the inherent temporal correlations among consecutive measurement vectors. Second, the proposed SE model can learn the actual power system states. Finally, this paper shows that this SE model can be effectively used to detect FDI attacks that otherwise remain stealthy to traditional SE-based bad data detectors. The proposed FDI attack detection technique is evaluated on a number of standard bus systems. The performance of state prediction and the accuracy of FDI attack detection are benchmarked against the state-of-the-art techniques. Experimental results show that the proposed FDI attack detection technique has a higher detection rate compared with the existing techniques while reducing the false alarms significantly.</p

    Energy-efficient hybrid routing protocol for IoT communication systems in 5G and beyond

    No full text
    One of the major concerns in wireless sensor networks (WSNs) is most of the sensor nodes are powered through limited lifetime of energy-constrained batteries, which majorly affects the performance, quality, and lifetime of the network. Therefore, diverse clustering methods are proposed to improve energy efficiency of the WSNs. In the meantime, fifth-generation (5G) communications require that several Internet of Things (IoT) applications need to adopt the use of multiple-input multiple-output (MIMO) antenna systems to provide an improved capacity over multi-path channel environment. In this paper, we study a clustering technique for MIMO-based IoT communication systems to achieve energy efficiency. In particular, a novel MIMO-based energy-efficient unequal hybrid clustering (MIMO-HC) protocol is proposed for applications on the IoT in the 5G environment and beyond. Experimental analysis is conducted to assess the effectiveness of the suggested MIMO-HC protocol and compared with existing state-of-the-art research. The proposed MIMO-HC scheme achieves less energy consumption and better network lifetime compared to existing techniques. Specifically, the proposed MIMO-HC improves the network lifetime by approximately 3× as long as the first node and the final node dies as compared with the existing protocol. Moreover, the energy that cluster heads consume on the proposed MIMO-HC is 40% less than that expended in the existing protocol
    corecore