37 research outputs found

    Evaluation of Machine Learning Algorithm on Drinking Water Quality for Better Sustainability

    Get PDF
    Water has become intricately linked to the United Nations\u27 sixteen sustainable development goals. Access to clean drinking water is crucial for health, a fundamental human right, and a component of successful health protection policies. Clean water is a significant health and development issue on a national, regional, and local level. Investments in water supply and sanitation have been shown to produce a net economic advantage in some areas because they reduce adverse health effects and medical expenses more than they cost to implement. However, numerous pollutants are affecting the quality of drinking water. This study evaluates the efficiency of using machine learning (ML) techniques in order to predict the quality of water. Thus, in this paper, a machine learning classifier model is built to predict the quality of water using a real dataset. First, significant features are selected. In the case of the used dataset, all measured characteristics are chosen. Data are split into training and testing subsets. A set of existing ML algorithms is applied, and the results are compared in terms of precision, recall, F1 score, and ROC curve. The results show that support vector machine and k-nearest neighbor are better according to F1-score and ROC AUC values. However, The LASSO LARS and stochastic gradient descent are better based on recall values

    Towards effective and efficient online exam systems using deep learning-based cheating detection approach

    Get PDF
    With the high growth of digitization and globalization, online exam systems continue to gain popularity and stretch, especially in the case of spreading infections like a pandemic. Cheating detection in online exam systems is a significant and necessary task to maintain the integrity of the exam and give unbiased, fair results. Currently, online exam systems use vision-based traditional machine learning (ML) methods and provide examiners with tools to detect cheating throughout the exam. However, conventional ML methods depend on handcrafted features and cannot learn the hierarchical representations of objects from data itself, affecting the efficiency and effectiveness of such systems. The proposed research aims to develop an effective and efficient approach for online exam systems that uses deep learning models for real-time cheating detection from recorded video frames and speech. The developed approach includes three essential modules, which constantly estimate the critical behavior of the candidate student. These modules are the front camera-based cheating detection module, the back camera-based cheating detection module, and the speech-based detection module. It can classify and detect whether the candidate is cheating during the exam by automatically extracting useful features from visual images and speech through deep convolutional neural networks (CNNs) and the Gaussian-based discrete Fourier transform (DFT) statistical method. We evaluate our system using a public dataset containing recorded audio and video data samples collected from different subjects carrying out several types of cheating in online exams. These collected data samples are used to obtain the experimental results and demonstrate the proposed work\u27s efficiency and effectiveness

    Promoting Teaching Practices in IT Higher Education

    Get PDF
    © 2020 Owner/Author. Lecture-based classes became an old strategy of teaching even in higher education. Education now focuses on student-centered strategies that actively engage students in their learning and how teacher can design classes to facilitate learning process. This paper presents some practices for teaching in higher education

    Dual Learning Model for Multiclass Brain Tumor Classification

    Get PDF
    A brain tumor occurs in the human body when the brain develops abnormal cells. Tumors are called either benign (noncancerous) or malignant (cancerous). The function of the nervous system is affected by the growth rate and the location of the tumor. The tumor treatment depends on tumor type, size, and location. Artificial intelligence has been widely used to automatically predict various brain tumors using multiple imaging technologies such as magnetic resonance imaging (MRI) and computerized tomography (CT) scan during the last few years. This paper applies a hybrid learning based classifier on an MRI dataset containing benign and malignant images. Moreover, deep learning is also applied to the same dataset. The proposed learning approach’s performance is compared to other existing supervised machine learning approaches. The experimental results show that our proposed approach outperforms the existing approaches available in the literature

    The rising trend of Metaverse in education: challenges, opportunities, and ethical considerations

    Get PDF
    Metaverse is invading the educational sector and will change human-computer interaction techniques. Prominent technology executives are developing novel ways to turn the Metaverse into a learning environment, considering the rapid growth of technology. Since the COVID-19 outbreak, people have grown accustomed to teleworking, telemedicine, and numerous other forms of distance interaction. Recently, the Metaverse has been the focus of many educators. With Facebook’s statement that it was rebranding and promoting itself as Meta, this field saw a surge in interest in the areas of computer science and education. There is a literature gap in studying the Metaverse’s role in education. This article is a systematic review following the PRISMA framework that reviews the role of the Metaverse in education to shrink the literature gap. It presents various educational uses to aid future research in this field. Additionally, it demonstrates how enabling technologies like extended reality (XR) and the internet of everything (IoE) will significantly impact educational services in the Metaverses of the future of teaching and learning. The article also outlines key challenges, ethical issues, and potential threats to using the Metaverse for education to offer a road map for future research that will investigate how the Metaverse will improve learning and teaching experiences

    A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach

    Get PDF
    © 2020 IEEE. Phishing emails are emails that pretend to be from a trusted company that target users to provide personal or financial information. Sometimes, they include links that may download malicious software on user\u27s computers, when clicked. Such emails are easily detected by spam filters that classify any email with a link as a phishing email. However, emails that have no links, link-less emails, requires more effort from the spam filters. Although many researches have been done on this topic, spam filters are still classifying some benign emails as phishing and vice-versa. This paper is focused on classifying link-less emails using machine learning approach, deep neural networks. Deep neural networks differs from simple neural network by having multiple hidden layers where data must be processed before reaching the output layer. The data used in this research is publicly available online. Hyper parameter optimization, was performed, using different settings on the data. In order to demonstrate the effectiveness of the approach, precision, recall and accuracy were computed. The results show that the deep neural network performed well in many of its settings

    An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems

    Get PDF
    The immense improvements in the latest internet inventions encouraged the adaptation of technology within the healthcare sector. The healthcare systems storing highly sensitive information can be targeted by attackers aiming to insert, delete, or modify the data stored. These malicious activities may cause severe damage to the database accessibility and lead to catastrophic long-term harm to the patients’ health. The adaptation of the most advanced security paradigm does not guarantee full protection. It is possible that the attack is not directly detected. This highlights the need to assess the widespread damage scale before starting the repair of the inconsistent medical database. Within the scope of the damage assessment and recovery, several matrices-based, cluster-based, and graph-based models were introduced. The objective of this work is to correctly assess the damage and recover the database within a suitable time frame and efficient utilization of memory. We use a lightweight structure based on hash tables to gauge the incurred damage and recuperate quickly following an attack. The presented approach is contrasted with other existing ones and demonstrated superior performance

    Artificial Intelligence Applications in Cybersecurity

    Get PDF
    For the past decades, cyber threats have been increasing significantly and are designed in a sophisticated way that is tough to detect using traditional protection tools. As a result, privacy and sensitive personal information such as credit card numbers are being continuously compromised. Therefore, it is time to find a solution that can stand against the spreading of such threats. Artificial intelligence, machine learning, and deep learning could be among the top methods of detecting cyber threats. These methods could help to improve the detection technologies and engines for computer network defense. This chapter mainly focuses on artificial intelligence in cybersecurity. The main goal of this chapter is to highlight the drawbacks of the traditional security protection tools and discuss the improvements that has been made so far by applying artificial intelligence to solve the current cybersecurity problems
    corecore