This paper demonstrates how Hidden Markov Model
(HMM) approach is used potentially as a tool for predicting the
next concepts visited by students in an Adaptive and Intelligent
Web-Based Educational System (AIWBES) for teaching English
as Foreign Language (EFL). This tool helps teachers to provide
their students with appropriate assistance during the learning
process in a timely manner. The prediction process is achieved
by following three phases, Initialization phase, adjustment phase
and prediction phase. The experiment results are encouraging
and serve to show the promise of HMM in AIWBESs and they
show accuracy in the next action prediction reaching up to 92%.
A new approach for building student model in an
Adaptive and intelligent Web-Based Educational System
(AIWBES) is introduced. This approach utilizes a hybrid
algorithm based on Fuzzy-ART2 neural network and stochastic
method called Hidden Markov Model (HMM), in order to
evaluate and categorize students’ knowledge status in six levels:
Excellent, very good, good, fair, weak and very weak; depending
on 5 parameters collected through their interactions with the
system. The student model is initialized by presenting a pre-test
form to students and it is updated dynamically according to their
study times and assessment results. Students' knowledge status
are modeled through three phases, initialization, training and
recall phases. In the initialization phase, input vectors are
normalized before they are categorized using unsupervised
algorithm Fuzzy-ART2 in 6 clusters representing 6 knowledge
status. A HMM is created for each cluster and when new
students' parameters are collected, they are introduced to Baum-
Welch re-estimation algorithm to train the 6 HMMs and to
maximize the observed sequence that is associated with a
particular cluster. Forward algorithm evaluates then the
likelihood of this sequence with respect to each of the HMMs and
to determine the maximum value, which represents the actual
knowledge status of the student. Experiment results show that
the proposed approach is capable of categorizing student
parameter vectors to their corresponding cluster with good
accuracies. The result of such classifications would open new
horizons and applications in AIWBES.
A data science observatory based on RAMP - rapid analytics and model prototypingAkin Osman Kazakci
RAMP approach to analytics: Rapid Analytics and Model Prototyping; collaborative data challenges with in-built data science process management tools and analytics; An observatory of data science and scientists. Presented at the Design Theory Special Interest Group of International Design Society. Mines ParisTech and Centre for Data Science.
Lecture on 22 January 2019
CAP Theorem
Byzantines General Problem
Blockchain for Beginners
Elective course from the Faculty of Information Technology, Thai - Nichi Institute of Technology, Bangkok for undergraduate students.
#BlockchainTNI2018
This document presents research on using machine learning to predict student performance in self-regulated learning from multimodal data sources. The researchers collected data from 9 PhD students over 3 weeks using sensors, self-reports, and context data. They developed an architecture to store and analyze the data, addressing challenges in feature extraction, sparsity, and inter-subject variability. Linear mixed models were able to incorporate individual differences but yielded low prediction accuracy. Opportunities exist to provide real-time feedback visualizations to students.
Humans have the extraordinary ability to learn continually from experience. Not only we can apply previously learned knowledge and skills to new situations, we can also use these as the foundation for later learning, constantly and efficiently updating our biased understanding of the external world. On the contrary, current AI systems are usually trained offline on huge datasets and later deployed with frozen learning capabilities as they have been shown to suffer from catastrophic forgetting if trained continuously on changing data distributions. A common, practical solution to the problem is to re-train the underlying prediction model from scratch and re-deploy it as a new batch of data becomes available. However, this naive approach is incredibly wasteful in terms of memory and computation other than impossible to sustain over longer timescales and frequent updates. In this talk, we will introduce an efficient continual learning strategy, which can reduce the amount of computation and memory overhead of more than 45% w.r.t. the standard re-train & re-deploy approach, further exploring its real-world application in the context of continual object recognition, running on the edge on highly-constrained hardware platforms such as widely adopted smartphones devices.
Deep learning has renewed interest in computational creativity. Can machines be creative? In which sense? And why this would be useful? We argue current creative AI systems are stuck: they explore combination, analogy or random, but the value of the objects are provided by the system designer.
The only way to creative AI is to develop agents building their own value.
We also argue: the generative potential of deep learning is understudied.
Current focus is on likelihood - whereas creativity is unlikely.
We present an implementation of these ideas on the MNIST handwritten digits dataset - to create symbols that could have been digits (e.g. in an imaginary culture) but that are not.
1. The document discusses experiences using semantic technologies in applications like MyPlanet, CS AKTive Space, and e-Response. It describes how each application uses technologies like ontologies.
2. Issues with semantic technologies are explored, like the difficulty of large-scale annotation and ontology building. Interoperability is discussed as a key enabler.
3. The talk addresses technology gaps, socio-political issues, and the importance of semantic interoperability for enabling automated collaborative tasks across heterogeneous systems.
Track 12. Educational innovation
Authors: Araceli Queiruga Dios, Angel Martin Del Rey, Ascensión Hernández, Jesus Martin-Vaquero, Luis Hernandez Encinas and Gerardo Rodriguez Sanchez
A new approach for building student model in an
Adaptive and intelligent Web-Based Educational System
(AIWBES) is introduced. This approach utilizes a hybrid
algorithm based on Fuzzy-ART2 neural network and stochastic
method called Hidden Markov Model (HMM), in order to
evaluate and categorize students’ knowledge status in six levels:
Excellent, very good, good, fair, weak and very weak; depending
on 5 parameters collected through their interactions with the
system. The student model is initialized by presenting a pre-test
form to students and it is updated dynamically according to their
study times and assessment results. Students' knowledge status
are modeled through three phases, initialization, training and
recall phases. In the initialization phase, input vectors are
normalized before they are categorized using unsupervised
algorithm Fuzzy-ART2 in 6 clusters representing 6 knowledge
status. A HMM is created for each cluster and when new
students' parameters are collected, they are introduced to Baum-
Welch re-estimation algorithm to train the 6 HMMs and to
maximize the observed sequence that is associated with a
particular cluster. Forward algorithm evaluates then the
likelihood of this sequence with respect to each of the HMMs and
to determine the maximum value, which represents the actual
knowledge status of the student. Experiment results show that
the proposed approach is capable of categorizing student
parameter vectors to their corresponding cluster with good
accuracies. The result of such classifications would open new
horizons and applications in AIWBES.
A data science observatory based on RAMP - rapid analytics and model prototypingAkin Osman Kazakci
RAMP approach to analytics: Rapid Analytics and Model Prototyping; collaborative data challenges with in-built data science process management tools and analytics; An observatory of data science and scientists. Presented at the Design Theory Special Interest Group of International Design Society. Mines ParisTech and Centre for Data Science.
Lecture on 22 January 2019
CAP Theorem
Byzantines General Problem
Blockchain for Beginners
Elective course from the Faculty of Information Technology, Thai - Nichi Institute of Technology, Bangkok for undergraduate students.
#BlockchainTNI2018
This document presents research on using machine learning to predict student performance in self-regulated learning from multimodal data sources. The researchers collected data from 9 PhD students over 3 weeks using sensors, self-reports, and context data. They developed an architecture to store and analyze the data, addressing challenges in feature extraction, sparsity, and inter-subject variability. Linear mixed models were able to incorporate individual differences but yielded low prediction accuracy. Opportunities exist to provide real-time feedback visualizations to students.
Humans have the extraordinary ability to learn continually from experience. Not only we can apply previously learned knowledge and skills to new situations, we can also use these as the foundation for later learning, constantly and efficiently updating our biased understanding of the external world. On the contrary, current AI systems are usually trained offline on huge datasets and later deployed with frozen learning capabilities as they have been shown to suffer from catastrophic forgetting if trained continuously on changing data distributions. A common, practical solution to the problem is to re-train the underlying prediction model from scratch and re-deploy it as a new batch of data becomes available. However, this naive approach is incredibly wasteful in terms of memory and computation other than impossible to sustain over longer timescales and frequent updates. In this talk, we will introduce an efficient continual learning strategy, which can reduce the amount of computation and memory overhead of more than 45% w.r.t. the standard re-train & re-deploy approach, further exploring its real-world application in the context of continual object recognition, running on the edge on highly-constrained hardware platforms such as widely adopted smartphones devices.
Deep learning has renewed interest in computational creativity. Can machines be creative? In which sense? And why this would be useful? We argue current creative AI systems are stuck: they explore combination, analogy or random, but the value of the objects are provided by the system designer.
The only way to creative AI is to develop agents building their own value.
We also argue: the generative potential of deep learning is understudied.
Current focus is on likelihood - whereas creativity is unlikely.
We present an implementation of these ideas on the MNIST handwritten digits dataset - to create symbols that could have been digits (e.g. in an imaginary culture) but that are not.
1. The document discusses experiences using semantic technologies in applications like MyPlanet, CS AKTive Space, and e-Response. It describes how each application uses technologies like ontologies.
2. Issues with semantic technologies are explored, like the difficulty of large-scale annotation and ontology building. Interoperability is discussed as a key enabler.
3. The talk addresses technology gaps, socio-political issues, and the importance of semantic interoperability for enabling automated collaborative tasks across heterogeneous systems.
Track 12. Educational innovation
Authors: Araceli Queiruga Dios, Angel Martin Del Rey, Ascensión Hernández, Jesus Martin-Vaquero, Luis Hernandez Encinas and Gerardo Rodriguez Sanchez
This document provides information about courses for a Bachelor of Technology in Computer Science and Engineering for Semester VIII. It lists 5 required courses covering topics like project work, electives in professional and open electives, and corresponding labs. Details are provided for each course including credit hours, examination scheme, topics covered and suggested reading materials. The document also outlines the eligibility criteria for elective courses.
This document provides an overview of the content that will be covered in the SPM 1012: Telecommunication and Networking course. The course will introduce students to technologies and devices used for computer networking and internet access. Key topics that will be covered include fundamentals of data communication, telecommunication facilities, network topology, internet technology and applications, and social and ethical issues related to web resources. Students will learn about hardware, software, data, procedures, communication methods, and people involved in computer and telecommunication systems. Assignments include developing a basic website and a report on networking setup in a school. Student learning outcomes, assessment methods, and course grading are also outlined.
An exploration of AI and analytics, blockchain, robotics and 3D printing, 5G and immersive technology, gamification, video based learning and their likely impact on learning in the medium term. Also has some cautions. Developed for a series of presentations across Canada.
Russell John Childs has over 20 years of experience in technical software engineering, modeling complex systems, and safety-critical C++ development. He has a PhD in Particle Physics from Birmingham University and skills in C++, algorithms, parallel programming, hardware modeling, testing, and more. His resume details roles at Microsoft, Sun Microsystems, Advantest, and more where he developed load balancing algorithms, hardware behavior models, testing frameworks, and more. He is currently seeking a role utilizing his experience in analysis, architecture, design, C++, and physics/mathematics background.
Monitoring Students Using Different Recognition Techniques for Surveilliance ...IRJET Journal
This document discusses using computer vision techniques like convolutional neural networks to monitor students and enforce dress codes in educational institutions. It proposes a system using cameras and image processing to identify whether students are properly dressed according to the dress code. The system would classify images of students as either following or not following the dress code. It also discusses related work on using technologies like biometrics and RFID cards for automated student attendance tracking and implications for security and discipline in schools.
Machine learning for autonomous online exam frauddetection: A concept designBIJIAM Journal
E-learning (EL) has emerged as one of the most valuable means for continuing education around the world,especially in the aftermath of the global pandemic that included a variety of obstacles. Real-time onlineassessments have become a significant concern for educational organizations. Instances of fraudulent behaviorduring online exams (OEs) have created considerable challenges for exam invigilators, who are unable to identifyand remove such dishonest behavior. In response to this significant issue, educational institutions have used avariety of manual procedures to alleviate the situation, but none of these measures have shown to be particularlyinnovative or effective. The current study presents a novel strategy for detecting fraudulent actions in real timeduring OEs that uses convolutional neural network (CNN) algorithms and image processing. The developmentmodel will be trained using the CK and CK++ datasets. The training procedure will use 80% of the selecteddataset, with the remaining 20% used for model testing to confirm the model’s efficacy and generalization capacity.This project intends to revolutionize the monitoring and prevention of fraudulent actions during online tests byintegrating CNN techniques and image processing. The use of CK and CK++ datasets, as well as an 80–20split for training and testing, contributes to the study’s thorough and rigorous approach. Educational institutionscan improve their assessment procedures and maintain the credibility of EL as a credible and equitable way ofcontinuing education by successfully using this unique technique.
Russell John Childs has over 10 years of experience in technical software engineering and modeling complex systems. He has extensive skills in C++, algorithms, data structures, physics, mathematics, and safety-critical programming. His career includes roles as a senior software engineer for several major tech companies, where he worked on projects such as concurrency optimization, statistical modeling, and automated testing. He holds a PhD in Particle Physics from Birmingham University and BSc in Physics from Liverpool University.
The document provides a summary of Hamid Barakat's professional experience and qualifications. It includes his contact information, objective, education history, work experience including roles as a project manager and software engineer, internships, study projects completed, technical skills, programming languages known, and interests. He has over 10 years of experience in software development and project management working with technologies such as Java, XML, databases, and frameworks.
The document discusses Karel Perutka, a senior lecturer at Tomas Bata University in Zlin, Czech Republic. It describes his educational background, areas of teaching which include MATLAB programming, and research interests which center around adaptive control, real-time control, and creating educational games and tools using MATLAB. It also provides details about four games he has created to help students learn programming concepts through a gaming format, including Labyrinth of MATLAB, LUDO, Automtest, and Riskuj.
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...IAEME Publication
The paper describes the conceptual model of adaptive control of cyber protection
of the informatization object (IO). Petri's Networks were used as a mathematical
device to solve the problem of adaptive control of user access rights. The simulation
model is proposed and the simulation in PIPE v4.3.0 package is performed. The
possibility of automating the procedures for adjusting the user profile to minimize or
neutralize cyber threats in the objects of informatization is shown. The model of
distribution of user tasks in computer networks of IO is proposed. The model, unlike
the existing, is based on the mathematical apparatus of Petri's Networks and contains
variables that allow reducing the power of the state space. Access control method
(ACM) is added. The addenda touched upon aspects of reconciliation of access rights
that are requested by the task and requirements of the security policy and the degree
of consistency of tasks and access to the IO nodes. Adjustment of rules and security
metrics for new tasks or redistributable tasks is described in the notation of Petri nets
Russell Childs has over 10 years of experience in technical software engineering, primarily in modeling complex systems. He has a PhD in Particle Physics from Birmingham University and a BSc in Physics from Liverpool University. His skills include C++, algorithms, data structures, physics simulation, and HPC modeling and simulation. He is currently seeking a role utilizing his experience in analysis, OO architecture, design, and safety-critical C++.
This document provides the scheme and syllabus for the M.Tech degree program in Computer Science and Engineering with specialization in Computer Science and Engineering offered by Kerala Technological University.
It outlines the course structure over four semesters. The first two semesters cover core subjects in areas like computational intelligence, data structures and algorithms, databases, computer networks, operating systems etc. along with electives. The third semester focuses on specialized electives and a project phase 1. The final semester involves the project phase 2.
Laboratory courses accompany the theoretical subjects. Evaluation is based on internal assessment and end semester exams. The document provides details of the courses offered, their objectives, outcomes and syllabus across the four se
Research Overview about the Multimedia Communications Lab (KOM) - Technische Universität Darmstadt - Germany
Research areas towards Adaptive Seamless Multimedia Communications are: Knowledge & Educational Technologies, Multimedia Technologies & Serious Games, Mobile Systems & Sensor Networks, Self-organizing Systems & Overlay Communications, Service-oriented Computing
Olive Chakraborty is seeking opportunities as a Cyber Security Professional. She has a Master of Science in Information Security from Royal Holloway, University of London and a Bachelor of Engineering in Computer Science from BITS Pilani, India. Her research experience includes internships in France, India, and Finland developing algorithms and mathematical models. She has expertise in cryptography, cyber security, and mathematical modeling. Her skills include programming languages, databases, networking, and operating systems. She has received academic awards and scholarships for her work.
Shilpa Batra is a computer science professional with over 5 years of experience in teaching and research. She holds an M.Tech in Information Technology from Amity University and a B.Tech in Information Technology. Her skills include programming languages like C, C++, Java and Python. She has worked as an Assistant Professor, Technical Content Writer, and Faculty. Her research interests are in areas like computer networking, data communication, software testing and database administration. She has published several research papers and completed projects in e-commerce, intrusion detection systems and computer networks.
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET Journal
This document discusses and compares different techniques for object and text detection from real-time images, including OCR, RCNN, Mask RCNN, Fast RCNN, and Faster RCNN algorithms. It finds that Mask RCNN, an extension of Faster RCNN, is generally the best algorithm for object detection in real-time images, as it outperforms other models in accuracy for tasks like object detection, segmentation, and captioning challenges. The document provides background on machine learning and neural networks approaches to image recognition and object detection.
Aakiel T. Abernathy is a computer science student at North Carolina Agricultural & Technical State University graduating in May 2017. He has relevant coursework in data structures, algorithms, computer architecture, databases, security and more. His projects include developing secure Android apps and an automated vehicle rental system. He has interned developing visual basic inventory software, applying MATLAB signal processing, and securing Cisco routers. Additionally, he has research and teaching assistant experience in computer science and tutoring experience to assist other students.
J. Fabricio Zelada Rivas is currently pursuing a Joint European Master in Space Science and Technology through a consortium of European universities. He holds a degree in Telecommunications Engineering from Pontificia Universidad Católica del Peru. He has work experience in research, software development, network administration, and project management. He is proficient in languages such as English, German, French and has experience working internationally in countries including France, Sweden, India, and China.
Niharika Gupta is seeking a career opportunity utilizing her M.Tech in Communication Engineering from VIT University. She has a BE from IGEC Sagar and over 2 years of experience in supply chain operations at Hindustan Coca-Cola. Her technical skills include MATLAB, C++ and software like AWR, ADS, and CST. She is currently working on an RF energy harvesting project using ADS simulation and an antenna design project using CST software.
This document provides information about courses for a Bachelor of Technology in Computer Science and Engineering for Semester VIII. It lists 5 required courses covering topics like project work, electives in professional and open electives, and corresponding labs. Details are provided for each course including credit hours, examination scheme, topics covered and suggested reading materials. The document also outlines the eligibility criteria for elective courses.
This document provides an overview of the content that will be covered in the SPM 1012: Telecommunication and Networking course. The course will introduce students to technologies and devices used for computer networking and internet access. Key topics that will be covered include fundamentals of data communication, telecommunication facilities, network topology, internet technology and applications, and social and ethical issues related to web resources. Students will learn about hardware, software, data, procedures, communication methods, and people involved in computer and telecommunication systems. Assignments include developing a basic website and a report on networking setup in a school. Student learning outcomes, assessment methods, and course grading are also outlined.
An exploration of AI and analytics, blockchain, robotics and 3D printing, 5G and immersive technology, gamification, video based learning and their likely impact on learning in the medium term. Also has some cautions. Developed for a series of presentations across Canada.
Russell John Childs has over 20 years of experience in technical software engineering, modeling complex systems, and safety-critical C++ development. He has a PhD in Particle Physics from Birmingham University and skills in C++, algorithms, parallel programming, hardware modeling, testing, and more. His resume details roles at Microsoft, Sun Microsystems, Advantest, and more where he developed load balancing algorithms, hardware behavior models, testing frameworks, and more. He is currently seeking a role utilizing his experience in analysis, architecture, design, C++, and physics/mathematics background.
Monitoring Students Using Different Recognition Techniques for Surveilliance ...IRJET Journal
This document discusses using computer vision techniques like convolutional neural networks to monitor students and enforce dress codes in educational institutions. It proposes a system using cameras and image processing to identify whether students are properly dressed according to the dress code. The system would classify images of students as either following or not following the dress code. It also discusses related work on using technologies like biometrics and RFID cards for automated student attendance tracking and implications for security and discipline in schools.
Machine learning for autonomous online exam frauddetection: A concept designBIJIAM Journal
E-learning (EL) has emerged as one of the most valuable means for continuing education around the world,especially in the aftermath of the global pandemic that included a variety of obstacles. Real-time onlineassessments have become a significant concern for educational organizations. Instances of fraudulent behaviorduring online exams (OEs) have created considerable challenges for exam invigilators, who are unable to identifyand remove such dishonest behavior. In response to this significant issue, educational institutions have used avariety of manual procedures to alleviate the situation, but none of these measures have shown to be particularlyinnovative or effective. The current study presents a novel strategy for detecting fraudulent actions in real timeduring OEs that uses convolutional neural network (CNN) algorithms and image processing. The developmentmodel will be trained using the CK and CK++ datasets. The training procedure will use 80% of the selecteddataset, with the remaining 20% used for model testing to confirm the model’s efficacy and generalization capacity.This project intends to revolutionize the monitoring and prevention of fraudulent actions during online tests byintegrating CNN techniques and image processing. The use of CK and CK++ datasets, as well as an 80–20split for training and testing, contributes to the study’s thorough and rigorous approach. Educational institutionscan improve their assessment procedures and maintain the credibility of EL as a credible and equitable way ofcontinuing education by successfully using this unique technique.
Russell John Childs has over 10 years of experience in technical software engineering and modeling complex systems. He has extensive skills in C++, algorithms, data structures, physics, mathematics, and safety-critical programming. His career includes roles as a senior software engineer for several major tech companies, where he worked on projects such as concurrency optimization, statistical modeling, and automated testing. He holds a PhD in Particle Physics from Birmingham University and BSc in Physics from Liverpool University.
The document provides a summary of Hamid Barakat's professional experience and qualifications. It includes his contact information, objective, education history, work experience including roles as a project manager and software engineer, internships, study projects completed, technical skills, programming languages known, and interests. He has over 10 years of experience in software development and project management working with technologies such as Java, XML, databases, and frameworks.
The document discusses Karel Perutka, a senior lecturer at Tomas Bata University in Zlin, Czech Republic. It describes his educational background, areas of teaching which include MATLAB programming, and research interests which center around adaptive control, real-time control, and creating educational games and tools using MATLAB. It also provides details about four games he has created to help students learn programming concepts through a gaming format, including Labyrinth of MATLAB, LUDO, Automtest, and Riskuj.
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...IAEME Publication
The paper describes the conceptual model of adaptive control of cyber protection
of the informatization object (IO). Petri's Networks were used as a mathematical
device to solve the problem of adaptive control of user access rights. The simulation
model is proposed and the simulation in PIPE v4.3.0 package is performed. The
possibility of automating the procedures for adjusting the user profile to minimize or
neutralize cyber threats in the objects of informatization is shown. The model of
distribution of user tasks in computer networks of IO is proposed. The model, unlike
the existing, is based on the mathematical apparatus of Petri's Networks and contains
variables that allow reducing the power of the state space. Access control method
(ACM) is added. The addenda touched upon aspects of reconciliation of access rights
that are requested by the task and requirements of the security policy and the degree
of consistency of tasks and access to the IO nodes. Adjustment of rules and security
metrics for new tasks or redistributable tasks is described in the notation of Petri nets
Russell Childs has over 10 years of experience in technical software engineering, primarily in modeling complex systems. He has a PhD in Particle Physics from Birmingham University and a BSc in Physics from Liverpool University. His skills include C++, algorithms, data structures, physics simulation, and HPC modeling and simulation. He is currently seeking a role utilizing his experience in analysis, OO architecture, design, and safety-critical C++.
This document provides the scheme and syllabus for the M.Tech degree program in Computer Science and Engineering with specialization in Computer Science and Engineering offered by Kerala Technological University.
It outlines the course structure over four semesters. The first two semesters cover core subjects in areas like computational intelligence, data structures and algorithms, databases, computer networks, operating systems etc. along with electives. The third semester focuses on specialized electives and a project phase 1. The final semester involves the project phase 2.
Laboratory courses accompany the theoretical subjects. Evaluation is based on internal assessment and end semester exams. The document provides details of the courses offered, their objectives, outcomes and syllabus across the four se
Research Overview about the Multimedia Communications Lab (KOM) - Technische Universität Darmstadt - Germany
Research areas towards Adaptive Seamless Multimedia Communications are: Knowledge & Educational Technologies, Multimedia Technologies & Serious Games, Mobile Systems & Sensor Networks, Self-organizing Systems & Overlay Communications, Service-oriented Computing
Olive Chakraborty is seeking opportunities as a Cyber Security Professional. She has a Master of Science in Information Security from Royal Holloway, University of London and a Bachelor of Engineering in Computer Science from BITS Pilani, India. Her research experience includes internships in France, India, and Finland developing algorithms and mathematical models. She has expertise in cryptography, cyber security, and mathematical modeling. Her skills include programming languages, databases, networking, and operating systems. She has received academic awards and scholarships for her work.
Shilpa Batra is a computer science professional with over 5 years of experience in teaching and research. She holds an M.Tech in Information Technology from Amity University and a B.Tech in Information Technology. Her skills include programming languages like C, C++, Java and Python. She has worked as an Assistant Professor, Technical Content Writer, and Faculty. Her research interests are in areas like computer networking, data communication, software testing and database administration. She has published several research papers and completed projects in e-commerce, intrusion detection systems and computer networks.
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET Journal
This document discusses and compares different techniques for object and text detection from real-time images, including OCR, RCNN, Mask RCNN, Fast RCNN, and Faster RCNN algorithms. It finds that Mask RCNN, an extension of Faster RCNN, is generally the best algorithm for object detection in real-time images, as it outperforms other models in accuracy for tasks like object detection, segmentation, and captioning challenges. The document provides background on machine learning and neural networks approaches to image recognition and object detection.
Aakiel T. Abernathy is a computer science student at North Carolina Agricultural & Technical State University graduating in May 2017. He has relevant coursework in data structures, algorithms, computer architecture, databases, security and more. His projects include developing secure Android apps and an automated vehicle rental system. He has interned developing visual basic inventory software, applying MATLAB signal processing, and securing Cisco routers. Additionally, he has research and teaching assistant experience in computer science and tutoring experience to assist other students.
J. Fabricio Zelada Rivas is currently pursuing a Joint European Master in Space Science and Technology through a consortium of European universities. He holds a degree in Telecommunications Engineering from Pontificia Universidad Católica del Peru. He has work experience in research, software development, network administration, and project management. He is proficient in languages such as English, German, French and has experience working internationally in countries including France, Sweden, India, and China.
Niharika Gupta is seeking a career opportunity utilizing her M.Tech in Communication Engineering from VIT University. She has a BE from IGEC Sagar and over 2 years of experience in supply chain operations at Hindustan Coca-Cola. Her technical skills include MATLAB, C++ and software like AWR, ADS, and CST. She is currently working on an RF energy harvesting project using ADS simulation and an antenna design project using CST software.
Similar to A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system (20)
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
bank management system in java and mysql report1.pdf
A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
1. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
A Hidden Markov Model Approach to
Predict Students' Actions in an
Adaptive and Intelligent Web-Based
Educational system
Masun Nabhan Homsi
University of Aleppo
SYRIA
Dr.Rania LUTFI
University of Al-Baath
SYRIA
Prof. Dr Ghias BARAKAT
University of Aleppo
SYRIA
Dr. Rosa María Carro Salas
Universidad Autónoma de
Madrid
2. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Overview
• Introduction.
• Prediction Process:
– Initialization Phase.
– Adjustment Phase.
– Prediction Phase.
• Prediction algorithm.
• Implementation & Results.
• Conclusions.
• Future works.
3. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Introduction
The system consists of five
Components:
• Domain model
• Student model
• Pedagogical module
• Interface module
• Prediction Module
AIWBES
Domain
Model
Pedagogic
al Module
Student
Model
Interface
NN-HMM
XML-DTD
Prediction
Module
•AIWBESs try to be more adaptive than traditional educational
systems "Just-put-it-on-the-web" by building a student model to
represent goals, preferences and knowledge of each student and
updating it in accordance with their knowledge acquisition
process.
4. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
HMM
, A, B
Prediction Module
It consists of 3 phases :
– Initialization Phase
– Adjustment Phase
– Prediction Phase
InitializationInitialization
Adjustment Prediction
Concepts
sequence
HMM
, A, B
New concepts'
sequence
Next
concept
General prediction process
5. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Initialization Phase
• N, the number of hidden states S= {S0, S1, …, SN-1), which
represents number of concepts in the domain model of the system.
qt represents the hidden state at time t.
• M, the number of observable states, with V = {V0, V1, …, VM-1} the
set of observable states (Symbols), and Ot the observation state at
time t.
• A={aij}, the transition probabilities between hidden states Si and Sj.
• B={bj(k)}, the probabilities of the observable states Vk in hidden
states Sj.
• ∏={i}, the initial hidden state probabilities.
AIWBES
Compute
, A, B
HMM
(λ)
Student
C01, C05, C11, …
Concepts' Sequence
6. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Adjustment Phase
• t(i): the forward variable
• t(i) : the backward variable
• t(i, j): the probability of being in hidden state Si at time t
and making a transition to state Sj at time t+1, given the
observation sequence O= O1, O2, …, OT and the model
=(A, B, ).
• t(i) :the probability of being in state Si at time t given the
observation sequence O= O1, O2, …, OT and the model
=(A, B, ).
AIWBES
C05, C011,…,C03
New Concepts'
Sequence
Compute
,
Compute
,
Compute
BA,,
HMM
HMM
λ
7. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Initialization & Adjustment Phases
1. For each student a HMM =(A, B, ) is
Initialized;
2. Compute t(i), t(i), t(i, j), t(i), t=1…,T, i-
0,…,N-1, j=0,…,N-1;
3. Adjust the model =(A, B, ) to get .
4. If P(O|) - P(O|)<Δ then stop.
5. Else set = and go to 2.
8. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Prediction Phase
Concepts
C01
C02
CN
Get
maximum
Probability
to predict
next
concept will
be visited
by the
student
C05,
C011,…,C03
New
Concepts'
Sequence
.
.
.
.
.
.
01C,03,…,C011, C05C
02C,03,…,C011, C05C
CN,03,…,C011, C05C
HMM
HMM
HMM
Forward
Algorithm
Forward
Algorithm
Forward
Algorithm
•The Forward Algorithm is applied to determine the probability distribution
of each concept (state) in the course.
•The highest value represents the next concept will be visited by the
student.
9. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (1)
Code Concept
C01 Verb to be-Positive Form
C02 Verb to be-Negative Form
C03 Verb to be-Question Form
… …
C42 Simple Future tense-Short and Long answers
Navigation sequence
C05 C06 C07 C08 C01 C02 C03 C04 C09 C10 …Student 1
C05 C06 C08 C07 C13 C15 C14 C16 C01 C02 …Student 2
C05 C08 C06 C07 C01 C02 C03 C09 C10 C04 …Student 3
Numbers
1- 10
Numbers
11- 20
Numbers
21-1000
Ordinal
numbers
Verb to be
Negative Form
Verb to be
Question Form
Verb to be
Short/Long answer
Simple Present Tense
Positive Form
? ? …
Verb to be
Positive Form
Simple Present Tense
Negative Form
10. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (2)
• A={aij}, the transition probabilities between
hidden states Si and Sj, are randomly initialized
to approximately 1/N, each row summing to 1.
• B={bj(k)}, the probabilities of the observable
states Vk in hidden states Sj. are randomly
initialized to approximately 1/M, each row
summing to 1.
• ∏={i}, the initial hidden state probabilities, are
randomly set to approximately 1/N, their sum
being 1.
11. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (3)
C05 C06 C07 C08 C01 C02 C03 C04 C09 C10
Where
should I
go?
C01 C02 C03 C11 C41 C42
HMM1 HMM2 HMM3 HMM11 HMM41 HMM42… …
0.025 0.013 0.070 0.090 0.083 8.065… …
12. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (4)
Code Concept
C01 Verb to be-Positive Form
C02 Verb to be-Negative Form
C03 Verb to be-Question Form
… …
C42 Simple Future tense-Short and Long answers
Navigation sequence
C05 C06 C07 C08 C01 C02 C03 C04 C09 C10 …Student 1
C05 C06 C08 C07 C13 C15 C14 C16 C01 C02 …Student 2
C05 C08 C06 C07 C01 C02 C03 C09 C10 C04 …Student 3
Simple Present Tense
Negative Form
Simple Present Tense
Short/Long Form …Offering, accepting
and refusing
Numbers
1- 10
Numbers
11- 20
Numbers
21-1000
Ordinal
numbers
Verb to be
Positive Form
Verb to be
Negative Form
Verb to be
Question Form
Verb to be
Short/Long answer
Simple Present Tense
Positive Form
Simple Present Tense
Negative Form
13. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (5)
A screenshot of HMM
predictor.
14. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (6)
Teacher's page to guide
students.
15. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (7)
Figure 5. A screenshot of HMM predictor
Suggestion list
A screenshot of
suggestion list.
16. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (8)
Recall (sensitivity)= Precision =
TP
TP+ FP
Predicted Concept
NegativePositive
False
Negative
(FN)
True Positive
(TP)
PositiveConcepts
True Negative
(TN)
False Positive
(FP)
Negative
TP
TP+ FN
17. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (9)
Testing results of various experiments
18. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Implementation and Results (10)
The relation between recall and precision
19. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Conclusions
• This paper shows how Hidden Markov Model
is very suitable for predicting students'
navigation actions within an AIWBES for
teaching EFL.
• The initial experiments show that the
concept prediction results can simulate
teacher guidance to students to find
appropriate information more efficiently
and accurately.
20. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
Future Work
• Prediction module needs to be evaluated
by a larger students' groups with the
objective to increase prediction latencies.
• Make several comparisons of results
among variations of student models using
Viterbi algorithm or Neural networks
21. A Hidden Markov Model Approach to Predict Students' Actions in an Adaptive and Intelligent Web-Based Educational system
International Conference on Information & Communications Technologies from Theory to Applications –ICTTA -08, 06-10 April 2008, Damascus-Syria
-University of Aleppo
ِ◌
- Al-Baath University
-Universidad Autónoma de Madrid