Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access


    Detection of Student Engagement in E-Learning Environments Using EfficientnetV2-L Together with RNN-Based Models

    Farhad Mortezapour Shiri1,*, Ehsan Ahmadi2, Mohammadreza Rezaee1, Thinagaran Perumal1

    Journal on Artificial Intelligence, Vol.6, pp. 85-103, 2024, DOI:10.32604/jai.2024.048911

    Abstract Automatic detection of student engagement levels from videos, which is a spatio-temporal classification problem is crucial for enhancing the quality of online education. This paper addresses this challenge by proposing four novel hybrid end-to-end deep learning models designed for the automatic detection of student engagement levels in e-learning videos. The evaluation of these models utilizes the DAiSEE dataset, a public repository capturing student affective states in e-learning scenarios. The initial model integrates EfficientNetV2-L with Gated Recurrent Unit (GRU) and attains an accuracy of 61.45%. Subsequently, the second model combines EfficientNetV2-L with bidirectional GRU (Bi-GRU), yielding an accuracy of 61.56%. The… More >

  • Open Access


    An Analysis Model of Learners’ Online Learning Status Based on Deep Neural Network and Multi-Dimensional Information Fusion

    Mingyong Li1, Lirong Tang1, Longfei Ma1, Honggang Zhao1, Jinyu Hu1, Yan Wei1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2349-2371, 2023, DOI:10.32604/cmes.2023.022604

    Abstract The learning status of learners directly affects the quality of learning. Compared with offline teachers, it is difficult for online teachers to capture the learning status of students in the whole class, and it is even more difficult to continue to pay attention to students while teaching. Therefore, this paper proposes an online learning state analysis model based on a convolutional neural network and multi-dimensional information fusion. Specifically, a facial expression recognition model and an eye state recognition model are constructed to detect students’ emotions and fatigue, respectively. By integrating the detected data with the homework test score data after… More >

  • Open Access


    Eye Strain Detection During Online Learning

    Le Quang Thao1,2,*, Duong Duc Cuong2, Vu Manh Hung3, Le Thanh Vinh3, Doan Trong Nghia4, Dinh Ha Hai3, Nguyen Nhan Nhi3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3517-3530, 2023, DOI:10.32604/iasc.2023.031026

    Abstract The recent outbreak of the coronavirus disease of 2019 (Covid-19) has been causing many disruptions among the education systems worldwide, most of them due to the abrupt transition to online learning. The sudden upsurge in digital electronic devices usage, namely personal computers, laptops, tablets and smartphones is unprecedented, which leads to a new wave of both mental and physical health problems among students, for example eye-related illnesses. The overexposure to electronic devices, extended screen time usage and lack of outdoor sunlight have put a consequential strain on the student’s ophthalmic health because of their young age and a relative lack… More >

  • Open Access


    Brain Storm Optimization Based Clustering for Learning Behavior Analysis

    Yu Xue1,2,*, Jiafeng Qin1, Shoubao Su2, Adam Slowik3

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 211-219, 2021, DOI:10.32604/csse.2021.016693

    Abstract Recently, online learning platforms have proven to help people gain knowledge more conveniently. Since the outbreak of COVID-19 in 2020, online learning has become a mainstream mode, as many schools have adopted its format. The platforms are able to capture substantial data relating to the students’ learning activities, which could be analyzed to determine relationships between learning behaviors and study habits. As such, an intelligent analysis method is needed to process efficiently this high volume of information. Clustering is an effect data mining method which discover data distribution and hidden characteristic from uncharacterized online learning data. This study proposes a… More >

  • Open Access


    Deep Learning Trackers Review and Challenge

    Yongxiang Gu1, Beijing Chen1, Xu Cheng1,*, Yifeng Zhang2,3, Jingang Shi4

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 23-33, 2019, DOI:10.32604/jihpp.2019.05938

    Abstract Recently, deep learning has achieved great success in visual tracking. The goal of this paper is to review the state-of-the-art tracking methods based on deep learning. First, we categorize the existing deep learning based trackers into three classes according to network structure, network function and network training. For each categorize, we analyze papers in different categories. Then, we conduct extensive experiments to compare the representative methods on the popular OTB-100, TC-128 and VOT2015 benchmarks. Based on our observations. We conclude that: (1) The usage of the convolutional neural network (CNN) model could significantly improve the tracking performance. (2) The trackers… More >

  • Open Access


    MalDetect: A Structure of Encrypted Malware Traffic Detection

    Jiyuan Liu1, Yingzhi Zeng2, Jiangyong Shi2, Yuexiang Yang2,∗, Rui Wang3, Liangzhong He4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 721-739, 2019, DOI:10.32604/cmc.2019.05610

    Abstract Recently, TLS protocol has been widely used to secure the application data carried in network traffic. It becomes more difficult for attackers to decipher messages through capturing the traffic generated from communications of hosts. On the other hand, malwares adopt TLS protocol when accessing to internet, which makes most malware traffic detection methods, such as DPI (Deep Packet Inspection), ineffective. Some literatures use statistical method with extracting the observable data fields exposed in TLS connections to train machine learning classifiers so as to infer whether a traffic flow is malware or not. However, most of them adopt the features based… More >

Displaying 1-10 on page 1 of 6. Per Page