排序方式: 共有95条查询结果,搜索用时 0 毫秒
1.
Ashit Kumar Dutta Mazen Mushabab Alqahtani Yasser Albagory Abdul Rahaman Wahab Sait Majed Alsanea 《计算机系统科学与工程》2023,44(3):2277-2292
Learning Management System (LMS) is an application software that is used in automation, delivery, administration, tracking, and reporting of courses and programs in educational sector. The LMS which exploits machine learning (ML) has the ability of accessing user data and exploit it for improving the learning experience. The recently developed artificial intelligence (AI) and ML models helps to accomplish effective performance monitoring for LMS. Among the different processes involved in ML based LMS, feature selection and classification processes find beneficial. In this motivation, this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring (GSO-MFWELM) technique for LMS. The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS. The proposed GSO-MFWELM technique involves GSO-based feature selection technique to select the optimal features. Besides, Weighted Extreme Learning Machine (WELM) model is applied for classification process whereas the parameters involved in WELM model are optimally fine-tuned with the help of Mayfly Optimization (MFO) algorithm. The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance. The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects. The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589. 相似文献
2.
Samra Rehman Muhammad Attique Khan Majed Alhaisoni Ammar Armghan Usman Tariq Fayadh Alenezi Ye Jin Kim Byoungchol Chang 《计算机、材料和连续体(英文)》2023,75(1):697-714
Identifying fruit disease manually is time-consuming, expert-required, and expensive; thus, a computer-based automated system is widely required. Fruit diseases affect not only the quality but also the quantity. As a result, it is possible to detect the disease early on and cure the fruits using computer-based techniques. However, computer-based methods face several challenges, including low contrast, a lack of dataset for training a model, and inappropriate feature extraction for final classification. In this paper, we proposed an automated framework for detecting apple fruit leaf diseases using CNN and a hybrid optimization algorithm. Data augmentation is performed initially to balance the selected apple dataset. After that, two pre-trained deep models are fine-tuning and trained using transfer learning. Then, a fusion technique is proposed named Parallel Correlation Threshold (PCT). The fused feature vector is optimized in the next step using a hybrid optimization algorithm. The selected features are finally classified using machine learning algorithms. Four different experiments have been carried out on the augmented Plant Village dataset and yielded the best accuracy of 99.8%. The accuracy of the proposed framework is also compared to that of several neural nets, and it outperforms them all. 相似文献
3.
Sohaib Manzoor Hira Manzoor Saddaf Rubab Muhammad Attique Khan Majed Alhaisoni Abdullah Alqahtani Ye Jin Kim Byoungchol Chang 《计算机、材料和连续体(英文)》2023,75(2):2347-2363
Despite the planned installation and operations of the traditional IEEE 802.11 networks, they still experience degraded performance due to the number of inefficiencies. One of the main reasons is the received signal strength indicator (RSSI) association problem, in which the user remains connected to the access point (AP) unless the RSSI becomes too weak. In this paper, we propose a multi-criterion association (WiMA) scheme based on software defined networking (SDN) in Wi-Fi networks. An association solution based on multi-criterion such as AP load, RSSI, and channel occupancy is proposed to satisfy the quality of service (QoS). SDN having an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance. To implement WiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator. The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30% and enhances the throughput by 20%–50%, hence maintaining user fairness and accommodating more wireless devices and traffic load in the network, when compared to traditional client-driven (CD) approach and state of the art Wi-Balance approach. 相似文献
4.
Razen Harbi Ibrahim Abdelaziz Panos Kalnis Nikos Mamoulis Yasser Ebrahim Majed Sahli 《The VLDB Journal The International Journal on Very Large Data Bases》2016,25(3):355-380
State-of-the-art distributed RDF systems partition data across multiple computer nodes (workers). Some systems perform cheap hash partitioning, which may result in expensive query evaluation. Others try to minimize inter-node communication, which requires an expensive data preprocessing phase, leading to a high startup cost. Apriori knowledge of the query workload has also been used to create partitions, which, however, are static and do not adapt to workload changes. In this paper, we propose AdPart, a distributed RDF system, which addresses the shortcomings of previous work. First, AdPart applies lightweight partitioning on the initial data, which distributes triples by hashing on their subjects; this renders its startup overhead low. At the same time, the locality-aware query optimizer of AdPart takes full advantage of the partitioning to (1) support the fully parallel processing of join patterns on subjects and (2) minimize data communication for general queries by applying hash distribution of intermediate results instead of broadcasting, wherever possible. Second, AdPart monitors the data access patterns and dynamically redistributes and replicates the instances of the most frequent ones among workers. As a result, the communication cost for future queries is drastically reduced or even eliminated. To control replication, AdPart implements an eviction policy for the redistributed patterns. Our experiments with synthetic and real data verify that AdPart: (1) starts faster than all existing systems; (2) processes thousands of queries before other systems become online; and (3) gracefully adapts to the query load, being able to evaluate queries on billion-scale RDF data in subseconds. 相似文献
5.
Al-Qurishi Muhammad Alhuzami Saad AlRubaian Majed Hossain M. Shamim Alamri Atif Rahman Md. Abdur 《Multimedia Tools and Applications》2018,77(9):11179-11201
Multimedia Tools and Applications - Online Social Networks (OSNs) have recently been the subject of numerous studies that have attempted to develop effective methods for classifying and analyzing... 相似文献
6.
7.
Inclusion distribution was studied in commercial aluminum DC-cast billets and slabs using a newly developed deep-etching method.
Analyses revealed a nonuniform distribution of nonmetallic inclusions across billet diameters and lengths, and also across
slab thicknesses and widths. In as-cast billets, more inclusions were found at the beginning and end of the billet length;
more were present near the cross-section center than near the surface. In slabs, inclusions were located mostly within 13 mm
of the surface and in a band between the centerline and the surface. Few inclusions were found 60 to 100 mm from the slab
surface or at the centerline. In addition, comparing slab quality after casting using three types of ceramic foam filters
(CFFs; i.e., 30 ppi, 50 ppi, and 50 ppi + HF) revealed significant differences in inclusion size, number, and distribution. Casting slabs
using a finer pore-size filter (50 ppi) reduced the number of non-metallic inclusions greatly. The inclusion distribution
patterns observed in the solidified slabs are discussed in terms of melt flow during casting. 相似文献
8.
A data breach can seriously impact organizational intellectual property,
resources, time, and product value. The risk of system intrusion is augmented by
the intrinsic openness of commonly utilized technologies like TCP/IP protocols.
As TCP relies on IP addresses, an attacker may easily trace the IP address of
the organization. Given that many organizations run the risk of data breach and
cyber-attacks at a certain point, a repeatable and well-developed incident response
framework is critical to shield them. Enterprise cloud possesses the challenges of
security, lack of transparency, trust and loss of controls. Technology eases quickens the processing of information but holds numerous risks including hacking and
confidentiality problems. The risk increases when the organization outsources the
cloud storage services through the vendor and suffers from security breaches and
need to create security systems to prevent data networks from being compromised. The business model also leads to insecurity issues which derail its popularity. An attack mitigation system is the best solution to protect online services
from emerging cyber-attacks. This research focuses on cloud computing security,
cyber threats, machine learning-based attack detection, and mitigation system.
The proposed SDN-based multilayer machine learning-based self-defense system
effectively detects and mitigates the cyber-attack and protects cloud-based enterprise solutions. The results show the accuracy of the proposed machine learning
techniques and the effectiveness of attack detection and the mitigation system. 相似文献
9.
A Al-Othman S Al-Musharaf NM Al-Daghri S Yakout KM Alkharfy Y Al-Saleh OS Al-Attas MS Alokail O Moharram S Sabico S Kumar GP Chrousos 《Nutrition journal》2012,11(1):56
ABSTRACT: BACKGROUND: Coffee and tea consumption was hypothesized to interact with variants of vitamin D-receptor polymorphisms, but limited evidence exists. Here we determine for the first time whether increased coffee and tea consumption affects circulating levels of 25-hydroxyvitamin D in a cohort of Saudi adolescents. METHODS: A total of 330 randomly selected Saudi adolescents were included. Anthropometrics were recorded and fasting blood samples were analyzed for routine analysis of fasting glucose, lipid levels, calcium, albumin and phosphorous. Frequency of coffee and tea intake was noted. 25-hydroxyvitamin D levels were measured using enzyme-linked immunosorbent assays. RESULTS: Improved lipid profiles were observed in both boys and girls, as demonstrated by increased levels of HDL-cholesterol, even after controlling for age and BMI, among those consuming 9--12 cups of coffee/week. Vitamin D levels were significantly highest among those consuming 9--12 cups of tea/week in all subjects (p-value 0.009) independent of age, gender, BMI, physical activity and sun exposure. CONCLUSION: This study suggests a link between tea consumption and vitamin D levels in a cohort of Saudi adolescents, independent of age, BMI, gender, physical activity and sun exposure. These findings should be confirmed prospectively. 相似文献
10.
M. Guedri S. Ghanmi R. Majed N. Bouhaddi 《Mechanical Systems and Signal Processing》2009,23(4):1123-1133
The aims of this work were to quantify the effects of uncertainties of design parameters on the variability of linear and non-linear behaviour of mechanical structures that we wish to optimize, and to calculate optimal and robust solutions resulting from numerical simulations. We propose a method that takes into account the propagation of uncertainties in finite-element models in a multi-objective optimization procedure. This method is based on coupling the stochastic response surface method (SRSM) and the non-dominated sorting genetic algorithm (NSGA). SRSM is based on application of the stochastic finite-element method via the polynomial chaos expansion method or the modal perturbation method. This strategy avoids the use of Monte Carlo simulation, in which costs can become prohibitive in optimization problems, especially when the finite-element models are large and have a considerable number of design parameters. The robust design described here has been developed to obtain an optimum value that is insensitive to changes of design variables within a feasible range. 相似文献