10,922 research outputs found

    Mathematics Intelligent Tutoring System

    Get PDF
    In these days, there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching mathematics that help students understand the basics of math and that helps a lot of students of all ages to understand the topic because it's important for students of adding and subtracting. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent tutoring systems was carried out and the results were encouraging

    Teaching the Right Letter Pronunciation in Reciting the Holy Quran Using Intelligent Tutoring System

    Get PDF
    An Intelligent Tutoring System (ITS) is a computer system that offers an instant, adapted instruction and customized feedback to students without human teacher interference. Reciting "Tajweed" the Holy Quran in the appropriate way is very important for all Muslims and is obligatory in Islamic devotions such as prayers. In this paper, the researchers introduce an intelligent tutoring system for teaching Reciting "Tajweed". Our "Tajweed" tutoring system is limited to "Tafkhim and Tarqiq in TAJWEED" the Holy Quran, Rewaya: Hafs from ‘Aasem. The system was evaluated by reciting teachers and students, and the results were auspicious

    The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home

    Get PDF
    Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack. The possibility for multi-hop agents to be malicious is higher compared to the one-hop or two-hop boomerang agents. The travel history is one of the factors that may allow a server to evaluate the trustworthiness of an agent. This paper proposes a technique to define levels of trust for multi-hop agents that are roaming in a smart home environment. These levels of trust are used later to determine actions taken by a host at the arrival of an agent. This technique uses fuzzy logic as a method to calculate levels of trust and to define protective actions in regard to those levels

    Random ambience using high fidelity images

    Get PDF
    Most of the secure communication nowadays mandates true random keys as an input. These operations are mostly designed and taken care of by the developers of the cryptosystem. Due to the nature of confidential crypto development today, pseudorandom keys are typically designed and still preferred by the developers of the cryptosystem. However, these pseudorandom keys are predictable, periodic and repeatable, hence they carry minimal entropy. True random keys are believed to be generated only via hardware random number generators. Careful statistical analysis is still required to have any confidence the process and apparatus generates numbers that are sufficiently random to suit the cryptographic use. In this underlying research, each moment in life is considered unique in itself. The random key is unique for the given moment generated by the user whenever he or she needs the random keys in practical secure communication. An ambience of high fidelity digital image shall be tested for its randomness according to the NIST Statistical Test Suite. Recommendation on generating a simple 4 megabits per second random cryptographic keys live shall be reported

    A noninvasive molecular approach: exploiting species-locus-specific PCR primers in defeating numts and DNA cross-contamination of cercopithecidae

    Get PDF
    The lack of a standardized, noninvasive molecular approach to studying genetic aspects of primates has made it hard for primatologists to decode the evolutionary history of these species. Researchers must optimize their own techniques to fully exploit the available samples. Lack of species-locus-specific primers also contributes to difficulties in using noninvasive genetic samples. Thus, the objectives of this study were to develop a standardized technique to collecting samples noninvasively, propose newly designed species-locus-specific primers, and optimize conditions for polymerase chain reaction (PCR) for Macaca fascicularis, M. nemestrina, Trachypithecus cristatus, and T. obscurus. Nine new species-locus-specific primers for three different loci of mitochondrial DNA, namely D-loop, cytochrome oxidase subunit I (COI), and cytochrome b, were successfully designed. These primers proved to be efficient in amplifying larger datasets (up to ~1,000 bp) of the targeted species in the optimized PCR conditions. The species-locus-specific primers are able to anneal to host DNA alone in highly contaminated feces of highlighted species. They can also offer alternatives measures in avoiding contamination related to nuclear insertion of mitochondrial pseudogenes (numts)

    Spectrum Analysis of Speech Recognition via Discrete Tchebichef Transform

    Get PDF
    Speech recognition is still a growing field. It carries strong potential in the near future as computing power grows. Spectrum analysis is an elementary operation in speech recognition. Fast Fourier Transform (FFT) is the traditional technique to analyze frequency spectrum of the signal in speech recognition. Speech recognition operation requires heavy computation due to large samples per window. In addition, FFT consists of complex field computing. This paper proposes an approach based on discrete orthonormal Tchebichef polynomials to analyze a vowel and a consonant in spectral frequency for speech recognition. The Discrete Tchebichef Transform (DTT) is used instead of popular FFT. The preliminary experimental results show that DTT has the potential to be a simpler and faster transformation for speech recognition

    Maximum Resilience of Artificial Neural Networks

    Full text link
    The deployment of Artificial Neural Networks (ANNs) in safety-critical applications poses a number of new verification and certification challenges. In particular, for ANN-enabled self-driving vehicles it is important to establish properties about the resilience of ANNs to noisy or even maliciously manipulated sensory input. We are addressing these challenges by defining resilience properties of ANN-based classifiers as the maximal amount of input or sensor perturbation which is still tolerated. This problem of computing maximal perturbation bounds for ANNs is then reduced to solving mixed integer optimization problems (MIP). A number of MIP encoding heuristics are developed for drastically reducing MIP-solver runtimes, and using parallelization of MIP-solvers results in an almost linear speed-up in the number (up to a certain limit) of computing cores in our experiments. We demonstrate the effectiveness and scalability of our approach by means of computing maximal resilience bounds for a number of ANN benchmark sets ranging from typical image recognition scenarios to the autonomous maneuvering of robots.Comment: Timestamp research work conducted in the project. version 2: fix some typos, rephrase the definition, and add some more existing wor

    Proposed Expert System for Calculating Inheritance in Islam

    Get PDF
    The truth of every human being is the end his life with death, and this leads to leaving assets and funds for those after him and can lead to hate between the heirs, it has made a point of Islamic law on all aspects of life, including the subject of the inheritance of the deceased. The main problem is how to get the knowledge of the basics of inheritance. This paper reviews work done in the use of expert system software to calculate inheritance in Islam. A proposed expert system was designed and developed using CLIPS language to calculate the inheritance in Islam
    • …
    corecore