Results for 'Hybrid Learning '

980 found
Order:
  1. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Information and Communication Technology in Elementary Schools: A Comparison Between Hybrid and Face-to-Face Learning Systems.Wisnu Zakaria, Turmudi Turmudi & Jupeth Pentang - 2022 - Profesi Pendidikan Dasar 9 (1):46-54.
    At the beginning of 2020, the world was experiencing the Covid-19 pandemic, and Indonesia was no exception. The occurrence of this affects the learning system in Indonesia, the learning system that was originally face-to-face was forced to online form, in this case the teachers are required to provide a creative, efficient and optimal learning system for students. So the purpose of this study is to find out the difference in the average learning result of elementary school (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  44
    Assessing Learning Behaviors Using Gaussian Hybrid Fuzzy Clustering (GHFC) in Special Education Classrooms (14th edition).DrR. Elankavi DrR. Udayakumar, Muhammad Abul Kalam, DrR. Sugumar - 2023 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (Jowua) 14 (1):118-125.
    The article suggests an unsupervised model for featuring student’s learning patterns in an open-ended learning scenario. The article proceeds by generating powerful metrics to characterize the learner’s behavior and efficacy through Coherence investigation. Then, the selected features are combined through a Gaussian Hybrid Fuzzy Clustering (GHFC) that categorizes students based on their learning patterns. The proposed system features the essential behaviors of every group and associate the behaviors with ability to develop right models to gauge the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  98
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. A hybrid Automated Intelligent COVID-19 Classification System Based on Neutrosophic Logic and Machine Learning Techniques Using Chest X-ray Images.Ibrahim Yasser, Aya A. Abd El-Khalek, A. A. Salama, Abeer Twakol, Mohy-Eldin Abo-Elsoud & Fahmi Khalifa - forthcoming - In Ibrahim Yasser, Aya A. Abd El-Khalek, A. A. Salama, Abeer Twakol, Mohy-Eldin Abo-Elsoud & Fahmi Khalifa, Advances in Data Science and Intelligent Data Communication Technologies for COVID-19 Pandemic (DSIDC-COVID-19) ,Studies in Systems, Decision and Control.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Advanced Cooling System for Hybrid Electric Vehicle Powertrains.S. Yoheswari - 2024 - International Journal of Science, Management and Innovative Research (Ijsmir) 8 (1):1-6.
    Hybrid Electric Vehicles (HEVs) have gained significant popularity due to their reduced environmental impact and fuel efficiency. However, the complex integration of electrical and mechanical systems in HEVs presents significant cooling challenges. A robust cooling system is essential to maintain optimal performance and extend the lifespan of powertrains and battery systems. This paper explores the development of an advanced cooling system designed specifically for HEV powertrains, leveraging modern technologies such as heat exchangers, liquid cooling, and smart thermal management systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  63
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. AI-Based Thermal Management System for Hybrid Electric Vehicles.S. Yoheswari - 2024 - International Journal of Science, Management and Innovative Research (Ijsmir) 8 (1):1-6.
    Hybrid Electric Vehicles (HEVs) are known for their ability to reduce carbon emissions and fuel consumption. However, managing the thermal aspects of HEVs, especially concerning their powertrains and battery systems, remains a significant challenge. Traditional cooling mechanisms often result in inefficiencies due to their static nature. This paper proposes an AI-based thermal management system designed to address these limitations by offering dynamic, adaptive thermal regulation for HEVs. The system integrates real-time data monitoring with AI algorithms to optimize the cooling (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A pluralist hybrid model for moral AIs.Fei Song & Shing Hay Felix Yeung - forthcoming - AI and Society:1-10.
    With the increasing degrees A.I.s and machines are applied across different social contexts, the need for implementing ethics in A.I.s is pressing. In this paper, we argue for a pluralist hybrid model for the implementation of moral A.I.s. We first survey current approaches to moral A.I.s and their inherent limitations. Then we propose the pluralist hybrid approach and show how these limitations of moral A.I.s can be partly alleviated by the pluralist hybrid approach. The core ethical decision-making (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  50
    Blended Learning to Overcome Inadequate Infrastructure.A. Arthi - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-9.
    Blended learning is a teaching approach that combines traditional in-person instruction with digital resources to create a more adaptable and accessible educational experience. This hybrid model blends the strengths of classroom teaching with the flexibility of online tools like virtual classrooms, e-books, and digital assessments, helping to overcome many of the challenges found in conventional education. Traditional education systems often face issues such as limited access to quality resources, outdated instructional materials, and inadequate teacher support, especially in remote (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  70
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  79
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Continuing The Distance Learning Modality of Graduate Studies in Post-Covid Philippines: A Survey.Jayrome Nuñez, Louie P. Gula, Evaflor Alindan, John Clinton Colcol, Aristonie Sangco, Jairoh Taracina, Sammy Dolba, Al John Escobañez, Kevin Sumayang, Mark Anthony Jamisal & Francis Jim Tuscano - 2023 - FDLA Journal 7 (1):1-17.
    Getting a graduate education is one of the most important parts of a professional in a field. It allows them to climb higher in the professional rankings or even get higher pay for their academic work. All graduate students are adults and self-directed due to their past experiences in work or practice. However, when the pandemic hit the world, these self-directed learners were not spared from shutting of schools. In the Philippines, most graduate schools deliver their lessons through the traditional (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  74
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  23
    ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  54
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Movie Recommendation System using Machine Learning Techniques.G. H. Ram Ganesh - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-20.
    The Movie Recommendation System using Machine Learning Techniques is a data-driven approach designed to provide personalized movie suggestions based on user preferences and historical data. This system leverages advanced machine learning algorithms, including collaborative filtering, content-based filtering, and hybrid methods, to predict the most relevant movies for individual users. The system's primary goal is to enhance user experience by recommending movies that align with their tastes, thereby promoting user engagement and satisfaction. The recommendation process starts by collecting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  21.  22
    House Price Prediction using Region-based Convolutional Neural Networks: _A Hybrid Approach Combining Structured and Image Data (13th edition).Rupali Gughe Siddhi Deshmukh - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):19393-19400. Translated by Siddhi Deshmukh.
    House price prediction is a critical task in real estate analytics, influenced by various factors such as location, economic conditions, and property features. Traditional machine learning models rely heavily on structured data, while recent advancements in deep learning enable the integration of unstructured data such as images. This paper presents a novel hybrid approach that combines structured numerical data with image-based features using Regionbased Convolutional Neural Networks (R-CNN). The proposed model improves predictive accuracy by leveraging both property (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  67
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  86
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  91
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Human-Aided Artificial Intelligence: Or, How to Run Large Computations in Human Brains? Towards a Media Sociology of Machine Learning.Rainer Mühlhoff - 2019 - New Media and Society 1.
    Today, artificial intelligence, especially machine learning, is structurally dependent on human participation. Technologies such as Deep Learning (DL) leverage networked media infrastructures and human-machine interaction designs to harness users to provide training and verification data. The emergence of DL is therefore based on a fundamental socio-technological transformation of the relationship between humans and machines. Rather than simulating human intelligence, DL-based AIs capture human cognitive abilities, so they are hybrid human-machine apparatuses. From a perspective of media philosophy and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  65
    Evaluating Advanced Deep Learning Methods for Regional Air Quality Index Forecasting.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):600-620.
    We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels based on historical data. Our experimental setup uses real-world air quality datasets from multiple regions, containing measurements of pollutants like PM2.5, PM10, CO, NO2, and SO2, alongside meteorological data such as temperature, humidity, and wind speed. The models are trained, validated, and tested using a split dataset, and their accuracy is evaluated using performance metrics like (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Menschengestützte Künstliche Intelligenz: Über die soziotechnischen Voraussetzungen von "deep learning".Rainer Mühlhoff - 2019 - Zeitschrift Für Medienwissenschaft (ZfM) 21 (2):56–64.
    Die aktuellen Erfolge von Künstlicher Intelligenz beruhen nicht nur auf technologischen Fortschritten, sondern auch auf einem grundlegenden soziotechnischen Strukturwandel. Denn maschinelle Lernverfahren wie Deep Learning benötigen eine große Menge Trainingsdaten, die nur über menschliche Mitarbeit gewonnen werden können. In einer Konvergenz von Methoden der Human-Computer-Interaction und der KI ist in den letzten zehn Jahren eine Fülle von Mensch-Maschine-Interfaces und medialen Infrastrukturen entstanden, durch die menschliche kognitive Ressourcen in hybride Mensch-Maschine-Apparate eingespannt werden. Diese Apparate vollbringen im Ganzen jene Leistung, die (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  86
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  21
    Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review.Asadollah Khadivi - 2024 - Journal of Philosophical Investigations 18 (49):193-218.
    the current research was conducted with the aim of investigating the applications and challenges of metaverse in education. This research was qualitative and its method was a systematic review based on the Prisma protocol. The scope of the current research was scientific and research articles published in domestic and foreign valid journals in Persian from 1398 to 1402 and English from 2020 to 2024 in the field of metaverse and education. The statistical sample was selected using a targeted method and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Filipino Students’ Standpoint on Going Back to Traditional Schooling in the New Normal.Louie Gula, Jayrome L. Nunez, Alvin L. Barnachea, Jover B. Jabagat & Jomar M. Urbano - 2022 - Journal of Teacher Education and Research 17 (1):16-21.
    Schools worldwide have started opening doors to welcome back students who, for almost two years, have been stuck studying at home. This study looks at the standpoint of Filipino students on going back to regular face-to-face schooling. There were 2,274 students of different tiers of education (high school, collegiate, graduate) from different major island groups of the Philippines (Luzon, Visayas, Mindanao) who participated in the study. The study used a mixed-method of descriptive statistics to present the quantitative data gathered and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Challenges in Teaching Science and its Transition to Post-Pandemic Education.Nemalynne Atriginio Amigo, Thelma Coloma Damaso, Sharmaine Agustin Diego, Jessica Rabor Laciste, Romelyn Tutaan Lagura, Ryan Bautista Tagata, Nove Lheen Castillo Taguicana & Eisle Keith Rivera Tapia - 2023 - American Journal of Multidisciplinary Research and Innovation 2 (3):15-22.
    The COVID-19 pandemic has had a significant impact on the education sector globally, with over one billion students being held out of school as a result of quarantine measures. In response, education systems had to quickly shift to online learning to ensure that students could continue their education. The sudden shift to online learning has resulted in educators having to adapt to the use of technology in education rapidly. The COVID-19 pandemic has highlighted the importance of digital literacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  51
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Absolutely No Free Lunches!Gordon Belot - forthcoming - Theoretical Computer Science.
    This paper is concerned with learners who aim to learn patterns in infinite binary sequences: shown longer and longer initial segments of a binary sequence, they either attempt to predict whether the next bit will be a 0 or will be a 1 or they issue forecast probabilities for these events. Several variants of this problem are considered. In each case, a no-free-lunch result of the following form is established: the problem of learning is a formidably difficult one, in (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  35. Automatic Face Mask Detection Using Python.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):91-100.
    The corona virus COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing facemasks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  70
    Definiteness in Tunisian Arabizi: Some Data from Statistical Approaches.Elisa Gugliotta, Angelapia Massaro, Giuliano Mion & Marco Dinarelli - 2024 - Romano-Arabica 23:49-76.
    We present a statistical analysis of the realization of definiteness in Tunisian Arabic (TA) texts written in Arabizi, a hybrid system reflecting some features of TA phonetics (assimilation), but also showing orthographic features, as the use of arithmographs. In §1, we give an overview of definiteness in TA from a semantic and syntactic point of view. In §2 we outline a typology of definite articles and show that TA normally marks definiteness with articles or similar devices, but also presents (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Advances and Applications of DSmT for Information Fusion. Collected Works, Volume 5.Florentin Smarandache - 2023 - Edited by Smarandache Florentin, Dezert Jean & Tchamova Albena.
    This fifth volume on Advances and Applications of DSmT for Information Fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics, and is available in open-access. The collected contributions of this volume have either been published or presented after disseminating the fourth volume in 2015 in international conferences, seminars, workshops and journals, or they are new. The contributions of each part of this volume are chronologically ordered. First Part of this book presents some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  38
    The Evolution of Cloud Computing: Key Trends and Future Directions.Rama Bansode Suvarna More - 2021 - International Journal of Advanced Research in Education and Technology 8 (1):447-452.
    Cloud computing has revolutionized the way businesses and individuals access and utilize computing resources. With its rapid adoption over the last few decades, it has become the backbone of many IT services across industries. This paper explores the evolution of cloud computing, highlighting key trends and identifying future directions that will shape the landscape. It discusses the evolution from traditional on-premise systems to the cloud-first approach, current advancements such as multi-cloud and hybrid cloud environments, and the growing integration of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  58
    Comparing LSTM, GRU, and CNN Approaches in Air Quality Prediction Models.A. Manoj Prabharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):576-585.
    The results show that the hybrid CNN-LSTM model outperforms the individual models in terms of prediction accuracy and robustness, suggesting that combining convolutional layers with recurrent units is beneficial for capturing both spatial and temporal patterns in air quality data. This study demonstrates the potential of deep learning methods to offer real-time, accurate air quality forecasting systems, which can aid policymakers and urban planners in managing air pollution more effectively.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Artificial morality: Making of the artificial moral agents.Marija Kušić & Petar Nurkić - 2019 - Belgrade Philosophical Annual 1 (32):27-49.
    Abstract: Artificial Morality is a new, emerging interdisciplinary field that centres around the idea of creating artificial moral agents, or AMAs, by implementing moral competence in artificial systems. AMAs are ought to be autonomous agents capable of socially correct judgements and ethically functional behaviour. This request for moral machines comes from the changes in everyday practice, where artificial systems are being frequently used in a variety of situations from home help and elderly care purposes to banking and court algorithms. It (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Divulging the Lived Experiences of Public School Teachers in the USA during COVID-19 Pandemic: Phenomenological Analysis.Jaypee Lopres, Glendale Niadas, Geraldine Minez, Greatchie Lopres, Madeleine Gutierrez, Albert Marion Quiap & Saturnino Renante Bangot Jr - 2023 - International Journal of Learning, Teaching and Educational Research 22 (5):180-205.
    This research examined the lived experiences of public school teachers in the United States during the COVID-19 pandemic. A qualitative design was performed using interpretative phenomenological analysis. Twenty public school teachers in the United States formed the sample, with the inclusion criterion being a minimum of three years’ teaching experience, including the pandemic. To meet the safety measure protocols set by the U.S. government, the data gathering was conducted online using Microsoft Forms. The semi-structured interviews comprised two sections: the first (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The meaning of ‘reasonable’: Evidence from a corpus-linguistic study.Lucien Baumgartner & Markus Kneer - 2025 - In Kevin Tobia, The Cambridge handbook of experimental jurisprudence. New York, NY: Cambridge University Press.
    The reasonable person standard is key to both Criminal Law and Torts. What does and does not count as reasonable behavior and decision-making is frequently deter- mined by lay jurors. Hence, laypeople’s understanding of the term must be considered, especially whether they use it predominately in an evaluative fashion. In this corpus study based on supervised machine learning models, we investigate whether laypeople use the expression ‘reasonable’ mainly as a descriptive, an evaluative, or merely a value-associated term. We find (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Bootstrapping of integer concepts: the stronger deviant-interpretation challenge.Markus Pantsar - 2021 - Synthese 199 (3-4):5791-5814.
    Beck presents an outline of the procedure of bootstrapping of integer concepts, with the purpose of explicating the account of Carey. According to that theory, integer concepts are acquired through a process of inductive and analogous reasoning based on the object tracking system, which allows individuating objects in a parallel fashion. Discussing the bootstrapping theory, Beck dismisses what he calls the "deviant-interpretation challenge"—the possibility that the bootstrapped integer sequence does not follow a linear progression after some point—as being general to (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  44. Next-Generation Cloud Security Frameworks:Balancing Privacy, Compliance, and Data Protection in a Digital-First Era.Varad Upadhye Atharva Hasabnis - 2025 - International Journal of Advanced Research in Education and Technology (Ijarety) 12 (2):453-457.
    As businesses increasingly migrate to cloud environments, the need for robust and adaptive cloud security frameworks becomes paramount. Cloud services provide numerous benefits such as scalability, flexibility, and cost-efficiency, but they also introduce significant risks in terms of privacy, compliance, and data protection. This paper explores the evolving landscape of cloud security, focusing on next-generation frameworks that aim to balance the often-competing demands of privacy, regulatory compliance, and data protection. We analyze emerging security models that incorporate advanced technologies such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Framing Morally Relevant Information: Contemporary Inquiry on The Frame Problem.Joever Orillosa‎ ‎ - manuscript
    Systems of artificial intelligence (AI) that make decisions with ethical consequences face a profound challenge: how to determine which information in a complex environment is morally relevant. This challenge is a manifestation of the classic frame problem, originally a technical issue in AI concerning how to represent what does not change when an action is performed, but now understood as a broader epistemological problem of relevance. This paper examines the frame problem in the contemporary context of AI ethical decision-making. I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  98
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Developing a Knowledge-Based System for Diagnosis and Treatment Recommendation of Neonatal Diseases Using CLIPS.Nida D. Wishah, Abed Elilah Elmahmoum, Husam A. Eleyan, Walid F. Murad & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (6):38-50.
    A newborn baby is an infant within the first 28 days of birth. Diagnosis and treatment of infant diseases require specialized medical resources and expert knowledge. However, there is a shortage of such professionals globally, particularly in low-income countries. To address this challenge, a knowledge-based system was designed to aid in the diagnosis and treatment of neonatal diseases. The system utilizes both machine learning and health expert knowledge, and a hybrid data mining process model was used to extract (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Evaluation and Design of Generalist Systems (EDGeS).John Beverley & Amanda Hicks - 2023 - Ai Magazine.
    The field of AI has undergone a series of transformations, each marking a new phase of development. The initial phase emphasized curation of symbolic models which excelled in capturing reasoning but were fragile and not scalable. The next phase was characterized by machine learning models—most recently large language models (LLMs)—which were more robust and easier to scale but struggled with reasoning. Now, we are witnessing a return to symbolic models as complementing machine learning. Successes of LLMs contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Predicting Default Rates in Credit Scoring Models using Advanced Mining Algorithms.Raja Gopinathan Vimal - 2017 - International Journal of Innovative Research in Science, Engineering and Technology 6 (12):23188-23193.
    Credit scoring is vital for assessing borrowers' creditworthiness and managing risks in financial systems. Traditional credit scoring models often fail to capture non-linear relationships and handle high-dimensional data, leading to less accurate predictions. This research explores the application of advanced data mining algorithms, such as ensemble learning methods, neural networks, and hybrid models, for predicting default rates. Empirical findings reveal significant improvements in predictive accuracy and interpretability. Key takeaways emphasize the importance of effective preprocessing and feature engineering techniques (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 980