Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (79)
  • Open Access

    ARTICLE

    Threefold Optimized Forecasting of Electricity Consumption in Higher Education Institutions

    Majida Kazmi1,*, Hashim Raza Khan1,2, Lubaba2, Mohammad Hashir Bin Khalid2, Saad Ahmed Qazi1,2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2351-2370, 2022, DOI:10.32604/cmc.2022.026265

    Abstract Energy management benefits both consumers and utility companies alike. Utility companies remain interested in identifying and reducing energy waste and theft, whereas consumers’ interest remain in lowering their energy expenses. A large supply-demand gap of over 6 GW exists in Pakistan as reported in 2018. Reducing this gap from the supply side is an expensive and complex task. However, efficient energy management and distribution on demand side has potential to reduce this gap economically. Electricity load forecasting models are increasingly used by energy managers in taking real-time tactical decisions to ensure efficient use of resources. Advancement in Machine-learning (ML) technology… More >

  • Open Access

    ARTICLE

    Student’s Health Exercise Recognition Tool for E-Learning Education

    Tamara al Shloul1, Madiha Javeed2, Munkhjargal Gochoo3, Suliman A. Alsuhibany4, Yazeed Yasin Ghadi5, Ahmad Jalal2, Jeongmin Park6,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 149-161, 2023, DOI:10.32604/iasc.2023.026051

    Abstract Due to the recently increased requirements of e-learning systems, multiple educational institutes such as kindergarten have transformed their learning towards virtual education. Automated student health exercise is a difficult task but an important one due to the physical education needs especially in young learners. The proposed system focuses on the necessary implementation of student health exercise recognition (SHER) using a modified Quaternion-based filter for inertial data refining and data fusion as the pre-processing steps. Further, cleansed data has been segmented using an overlapping windowing approach followed by patterns identification in the form of static and kinematic signal patterns. Furthermore, these… More >

  • Open Access

    ARTICLE

    Smartphone Sensors Based Physical Life-Routine for Health Education

    Tamara al Shloul1, Usman Azmat2, Suliman A. Alsuhibany3, Yazeed Yasin Ghadi4, Ahmad Jalal2, Jeongmin Park5,*

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 715-732, 2022, DOI:10.32604/iasc.2022.025421

    Abstract The physical and the mental health of a human being largely depends upon his physical life-routine (PLR) and today’s much advanced technological methods make it possible to recognize and keep track of an individual’s PLR. With the successful and accurate recognition of PLR, a sublime service of health education can be made copious. In this regard, smartphones can play a vital role as they are ubiquitous and have utilitarian sensors embedded in them. In this paper, we propose a framework that extracts the features from the smartphone sensors data and then uses the sequential feature selection to select the most… More >

  • Open Access

    ARTICLE

    Blockchain for Education: Verification and Management of Lifelong Learning Data

    Ba-Lam Do*, Van-Thanh Nguyen, Hoang-Nam Dinh, Thanh-Chung Dao, BinhMinh Nguyen

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 591-604, 2022, DOI:10.32604/csse.2022.023508

    Abstract In recent years, blockchain technology has been applied in the educational domain because of its salient advantages, i.e., transparency, decentralization, and immutability. Available systems typically use public blockchain networks such as Ethereum and Bitcoin to store learning results. However, the cost of writing data on these networks is significant, making educational institutions limit data sent to the target network, typically containing only hash codes of the issued certificates. In this paper, we present a system based on a private blockchain network for lifelong learning data authentication and management named B4E (Blockchain For Education). B4E stores not only certificates but also… More >

  • Open Access

    ARTICLE

    Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, Maha Farouk S. Sabir1, Ahmed Elhassanein5,6, Ashraf A. Gouda4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3385-3399, 2022, DOI:10.32604/cmc.2022.026477

    Abstract Education acts as an important part of economic growth and improvement in human welfare. The educational sectors have transformed a lot in recent days, and Information and Communication Technology (ICT) is an effective part of the education field. Almost every action in university and college, right from the process from counselling to admissions and fee deposits has been automated. Attendance records, quiz, evaluation, mark, and grade submissions involved the utilization of the ICT. Therefore, security is essential to accomplish cybersecurity in higher security institutions (HEIs). In this view, this study develops an Automated Outlier Detection for CyberSecurity in Higher Education… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3131-3144, 2022, DOI:10.32604/cmc.2022.026457

    Abstract Education 4.0 is being authorized more and more by the design of artificial intelligence (AI) techniques. Higher education institutions (HEI) have started to utilize Internet technologies to improve the quality of the service and boost knowledge. Due to the unavailability of information technology (IT) infrastructures, HEI is vulnerable to cyberattacks. Biometric authentication can be used to authenticate a person based on biological features such as face, fingerprint, iris, and so on. This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions, named SRODL-LAC technique. The proposed SRODL-LAC technique… More >

  • Open Access

    ARTICLE

    Enhanced Artificial Intelligence-based Cybersecurity Intrusion Detection for Higher Education Institutions

    Abdullah S. AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, Maha Farouk S. Sabir1

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2895-2907, 2022, DOI:10.32604/cmc.2022.026405

    Abstract As higher education institutions (HEIs) go online, several benefits are attained, and also it is vulnerable to several kinds of attacks. To accomplish security, this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security. The incorporation of the strategies into business is a tendency among several distinct industries, comprising education, have recognized as game changer. Consequently, the HEIs are highly related to the requirement and knowledge of the learner, making the education procedure highly effective. Thus, artificial intelligence (AI) and machine learning (ML) models have shown significant interest in HEIs. This study designs a novel Artificial Intelligence… More >

  • Open Access

    ARTICLE

    Sentiment Analysis in Social Media for Competitive Environment Using Content Analysis

    Shahid Mehmood1, Imran Ahmad1, Muhammad Adnan Khan1,2, Faheem Khan3, T. Whangbo3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5603-5618, 2022, DOI:10.32604/cmc.2022.023785

    Abstract Education sector has witnessed several changes in the recent past. These changes have forced private universities into fierce competition with each other to get more students enrolled. This competition has resulted in the adoption of marketing practices by private universities similar to commercial brands. To get competitive gain, universities must observe and examine the students’ feedback on their own social media sites along with the social media sites of their competitors. This study presents a novel framework which integrates numerous analytical approaches including statistical analysis, sentiment analysis, and text mining to accomplish a competitive analysis of social media sites of… More >

  • Open Access

    ARTICLE

    An Effective and Secure Quality Assurance System for a Computer Science Program

    Mohammad Alkhatib*

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 975-995, 2022, DOI:10.32604/csse.2022.021398

    Abstract Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs) assessment and continuous quality improvement represent core components of the quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes for continuous improvement planning. Moreover, the absence of automation, and integration in QA processes forms a major obstacle towards developing efficient quality system. There is a pressing need to adopt security protocols that provide required security services to safeguard the valuable information processed by QAS as well. This research proposes an effective… More >

  • Open Access

    ARTICLE

    An Improved Evolutionary Algorithm for Data Mining and Knowledge Discovery

    Mesfer Al Duhayyim1, Radwa Marzouk2,3, Fahd N. Al-Wesabi4, Maram Alrajhi5, Manar Ahmed Hamza6,*, Abu Sarwar Zamani6

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1233-1247, 2022, DOI:10.32604/cmc.2022.021652

    Abstract Recent advancements in computer technologies for data processing, collection, and storage have offered several chances to improve the abilities in production, services, communication, and researches. Data mining (DM) is an interdisciplinary field commonly used to extract useful patterns from the data. At the same time, educational data mining (EDM) is a kind of DM concept, which finds use in educational sector. Recently, artificial intelligence (AI) techniques can be used for mining a large amount of data. At the same time, in DM, the feature selection process becomes necessary to generate subset of features and can be solved by the use… More >

Displaying 31-40 on page 4 of 79. Per Page