10,922 research outputs found
Mathematics Intelligent Tutoring System
In these days, there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching mathematics that help students understand the basics of math and that helps a lot of students of all ages to understand the topic because it's important for students of adding and subtracting. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent tutoring systems was carried out and the results were encouraging
Teaching the Right Letter Pronunciation in Reciting the Holy Quran Using Intelligent Tutoring System
An Intelligent Tutoring System (ITS) is a computer system that offers an instant, adapted instruction and customized feedback to students without human teacher interference.
Reciting "Tajweed" the Holy Quran in the appropriate way is very important for all Muslims and is obligatory in Islamic devotions such as prayers.
In this paper, the researchers introduce an intelligent tutoring system for teaching Reciting "Tajweed". Our "Tajweed" tutoring system is limited to "Tafkhim and Tarqiq in TAJWEED" the Holy Quran, Rewaya: Hafs from âAasem.
The system was evaluated by reciting teachers and students, and the results were auspicious
The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets,
system resources, and the reputation of the host are few possible targets for such an attack. The
possibility for multi-hop agents to be malicious is higher compared to the one-hop or two-hop
boomerang agents. The travel history is one of the factors that may allow a server to evaluate the
trustworthiness of an agent. This paper proposes a technique to define levels of trust for multi-hop
agents that are roaming in a smart home environment. These levels of trust are used later to
determine actions taken by a host at the arrival of an agent. This technique uses fuzzy logic as a
method to calculate levels of trust and to define protective actions in regard to those levels
Random ambience using high fidelity images
Most of the secure communication nowadays mandates true random keys as an input. These operations are mostly
designed and taken care of by the developers of the cryptosystem. Due to the nature of confidential crypto development
today, pseudorandom keys are typically designed and still preferred by the developers of the cryptosystem. However,
these pseudorandom keys are predictable, periodic and repeatable, hence they carry minimal entropy. True random keys
are believed to be generated only via hardware random number generators. Careful statistical analysis is still required to
have any confidence the process and apparatus generates numbers that are sufficiently random to suit the cryptographic
use. In this underlying research, each moment in life is considered unique in itself. The random key is unique for the
given moment generated by the user whenever he or she needs the random keys in practical secure communication. An
ambience of high fidelity digital image shall be tested for its randomness according to the NIST Statistical Test Suite.
Recommendation on generating a simple 4 megabits per second random cryptographic keys live shall be reported
A noninvasive molecular approach: exploiting species-locus-specific PCR primers in defeating numts and DNA cross-contamination of cercopithecidae
The lack of a standardized, noninvasive molecular approach to studying genetic aspects of primates has made it hard for primatologists to decode the evolutionary history of these species. Researchers must optimize their own techniques to fully exploit the available samples. Lack of species-locus-specific primers also contributes to difficulties in using noninvasive genetic samples. Thus, the objectives of this study were to develop a standardized technique to collecting samples noninvasively, propose newly designed species-locus-specific primers, and optimize conditions for polymerase chain reaction (PCR) for Macaca fascicularis, M. nemestrina, Trachypithecus cristatus, and T. obscurus. Nine new species-locus-specific primers for three different loci of mitochondrial DNA, namely D-loop, cytochrome oxidase subunit I (COI), and cytochrome b, were successfully designed. These primers proved to be efficient in amplifying larger datasets (up to ~1,000 bp) of the targeted species in the optimized PCR conditions. The species-locus-specific primers are able to anneal to host DNA alone in highly contaminated feces of highlighted species. They can also offer alternatives measures in avoiding contamination related to nuclear insertion of mitochondrial pseudogenes (numts)
Spectrum Analysis of Speech Recognition via Discrete Tchebichef Transform
Speech recognition is still a growing field. It carries strong potential in the near future as computing power grows.
Spectrum analysis is an elementary operation in speech recognition. Fast Fourier Transform (FFT) is the traditional
technique to analyze frequency spectrum of the signal in speech recognition. Speech recognition operation requires
heavy computation due to large samples per window. In addition, FFT consists of complex field computing. This paper
proposes an approach based on discrete orthonormal Tchebichef polynomials to analyze a vowel and a consonant in
spectral frequency for speech recognition. The Discrete Tchebichef Transform (DTT) is used instead of popular FFT.
The preliminary experimental results show that DTT has the potential to be a simpler and faster transformation for
speech recognition
Maximum Resilience of Artificial Neural Networks
The deployment of Artificial Neural Networks (ANNs) in safety-critical
applications poses a number of new verification and certification challenges.
In particular, for ANN-enabled self-driving vehicles it is important to
establish properties about the resilience of ANNs to noisy or even maliciously
manipulated sensory input. We are addressing these challenges by defining
resilience properties of ANN-based classifiers as the maximal amount of input
or sensor perturbation which is still tolerated. This problem of computing
maximal perturbation bounds for ANNs is then reduced to solving mixed integer
optimization problems (MIP). A number of MIP encoding heuristics are developed
for drastically reducing MIP-solver runtimes, and using parallelization of
MIP-solvers results in an almost linear speed-up in the number (up to a certain
limit) of computing cores in our experiments. We demonstrate the effectiveness
and scalability of our approach by means of computing maximal resilience bounds
for a number of ANN benchmark sets ranging from typical image recognition
scenarios to the autonomous maneuvering of robots.Comment: Timestamp research work conducted in the project. version 2: fix some
typos, rephrase the definition, and add some more existing wor
Proposed Expert System for Calculating Inheritance in Islam
The truth of every human being is the end his life with death, and this leads to leaving assets and funds for those after him and can lead to hate between the heirs, it has made a point of Islamic law on all aspects of life, including the subject of the inheritance of the deceased.
The main problem is how to get the knowledge of the basics of inheritance. This paper reviews work done in the use of expert system software to calculate inheritance in Islam. A proposed expert system was designed and developed using CLIPS language to calculate the inheritance in Islam
- âŚ