3,169 research outputs found

    Ontology reasoning using SPARQL query: A case study of e-learning usage

    Get PDF
    The involvement of learning pedagogy towards implementation of e-learning contribute to the additional values, and it is assign as a benchmark when the investigation and evaluation will carry out. The results obtained later believed would be fit to the domain problem.The results might provide instructional theories including recommendation after reasoning that can be used to improve the quality of teaching and learning in the virtual classroom. Ontology as formal conceptualization has been chosen as research methodology. Ontology conceptualization helps to illustrate the e-learning usage including activities and actions, likewise learning pedagogy in the form of concepts, class, relationships and instances. The ontology constructed in this paper is used in conjunction with the SPARQL rules, which are designed to test the reasoning ability of ontology. Reasoning results should be able to describe the knowledge contained in ontology, as well the facts on it. The SPARQL rules contains triplets to verify if the students are actively engaged in a meaningful way towards e-learning usage. The backward engine is optimized to store the facts obtained from queries. Development of ontology knowledge based and reasoning rules with SPARQL queries allow to contribute a sustainable competitive advantages regarding the e-learning utilization. Eventually, this research produced a learning ontology with reasoning capability to get meaningful information

    An Intelligent Intrusion Detection System for Internet of Things Attack Detection and Identification Using Machine Learning

    Get PDF
    The usability and scalability of Internet of things (IoT) technology are expanding in such a way that they facilitate human living standards. However, they increase the vulnerabilities and attack vectors over IoT networks as well. Thus, more security challenges could be expected and encountered, and more security services and solutions should be provided. Although many security techniques propose and promise good solutions for that intrusion detection systems IDSs still considered the best. Many works proposed machine learning (ML)-based IDSs for IoT attack detection and classification. Nevertheless, they suffer from two main gaps. First, few of the works utilized or could analyze an up-to-date version of IoT-based attack behaviors. Second, few of the works can be considered as multi-class attack detection and classification. Therefore, this work proposes an intelligent IDS (IIDS) by exploiting the ability of ML algorithms to classify and identify malicious from benign behaviors among IoT network packets. Three ML classifier algorithms are investigated, which are K-Nearest Neighbor, support vector machine, and artificial neural network. The developed models have been trained and tested as binary and multi-class classifiers against 15 types of attacks and benign. This work employs an up-to-date dataset known as IoT23, which covers millions of malicious and benign behaviors of IoT-connected devices. The process of developing the proposed IIDSs goes under different preprocessing phases and methods, such as null value solving, SMOTE method for the imbalanced datasets, data normalization, and feature selections. The results present IIDSs as good binary and multi-class classifiers even for zero-day attacks

    Metabolic cost during tyre and rope functional training

    Get PDF
    This study aimed to examine the metabolic cost during tyre and rope functional training. 20 male youth aged between 20 and 24 years old with average age (22.05 ± 1.46) were recruited for this study. Participants involved in three types of exercise that uses rope and three types of exercise using a tire. Metabolic cost (Metabolic Equivalent of Task value, oxygen consumption, energy cost, and pulse rate training) during training was measured using a special tool called portable metabolic analyzer. Results showed the average MET value for exercises using rope and tires for 10 minutes was 7.25 ± 1.62. The average recorded oxygen consumption was 1655.05 ± 295.703) mL · min -1. While the average energy used is 74.75 ± 14.78 kcal or 7.47 kcal · min -1. The average pulse rate during a 10-minute exercise function was 153.15 ± 13.28 per minute. Overall, using rope and tire as tools for resistance training would give many advantages for the functionality development among the individuals.Keywords: metabolic cost; rope; tyre; oxygen; functionality

    Performance Evaluation of Multiple Differential Detection for Third Generation Mobile Communication System

    Get PDF
    Third generation mobile communication system is widely used nowadays. One of its parameter standard, which is QPSK modulation has been adopted by International Telecommunication Union (ITU) to be used in IMT-2000. However, due to amplitude variations introduced in QPSK, a rather robust and reliable data modulation technique, namely the p/4-shift Differential QPSK is proposed. For detection purposes, two types of detectors are evaluated for their performance in AWGN and Rayleigh fading channels.A differential detection technique called multiple differential detection technique which uses maximumlikelihood sequence estimation (MLSE) of the transmitted phases is compared with conventional differential detection which uses symbol-by-symbol detection. By using some of the IMT-2000 standard parameters, the simulation results show that multiple differential detection scheme performs much better than conventional differential detection scheme

    Exploring the use of social media tools among students for teaching and learning purpose

    Get PDF
    Social media network is a fairly recent word used to define a form of learning that can be performed via websites online learning. The exploring of the potential use of social media tools and impact of contingent factors on the relationship between three predictors was investigated. A total of 235 valid responses were received from undergraduate students Faculty of Computing, Universiti Teknologi Malaysia (UTM) in the study. Several factors have been found to correlate with social media use, active learning both to affect teaching and learning. The researchers made use of the structural equation modelling (SEM) method with the SmartPLS program to shed a light on the adoption process. The results show that the use of social media positively and significantly relates to active learning, which in turn affect teaching and learning

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems

    Get PDF
    The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. The procedure of extracting the iris region from an eye image using circular parameters can be improved via approximately too many approaches in literature but remain some portions under slightly unconstrained circumstances. In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. The iris boundary is discovered using the suggested segmentation approach and a computational model of the pixel value. The BHA looks for the central radius of the iris and pupil. The system uses MATLAB to test the CASIA-V3 database. The segmented images exhibit 98.71% accuracy. For all future access control applications, the segmentation-based BHA is effective at identifying the iris. The integration of the BHA with the Hough transforms and Canny edge detector is the main method by which the iris segmentation is accomplished. This novel technique improves the accuracy and effectiveness of iris segmentation, with potential uses in image analysis and biometric identification

    Improving IEEE 802.11 to Support Quality of Service in Wireless Networks

    Get PDF
    This paper investigates and describes the Quality of Services (QoS) provisioning techniques for IEEE 802.11 based networks, focusing on the Distributed Coordination Function (DCF). This paper propose better techniques to provide QoS by assigning new parameters to the DCF access method, involving the DCF Interframe Space (DIFS), backoff time and the maximum data packet size to high priority nodes, which will distinguish the high priority traffic from the low priority traffic to support QoS. A simulation is done using Network Simulator 2 (NS-2) and the expected output is then presented

    Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks

    Get PDF
    This paper investigates and describes a new provisioning technique for IEEE 802.11 based networks, focusing on the ad-hoc Distributed Coordination Function (DCF) to redefine stability of the network throughput to support QoS. This paper propose better techniques to achieve stable throughput in Wireless LAN networks by assigning new values to the Contention Window to high priority traffics which will guarantee better throughput to the selected network traffic. A simulation is done using Network Simulator 2 (NS-2) and findings are then presented. Results showed that stable throughput can be achieved to provide better traffic flows especially for real-time traffic and multimedia applications

    Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks

    Get PDF
    This paper paper investigates, describes and propose better techniques to provide QoS by assigning new metrics to the DCF access method, involving the DCF Interframe Space (DIFS), Contention Window values and the maximum data packet size to high priority nodes, which will bias towards high priority multimedia traffic to support QoS. A simulation is done using Network Simulator 2 (NS-2) and comparisons were made between different sets of network simulation scenarios. Improvements on throughput, delay and jitter can clearly be seen and further analysis is then presented
    corecore