The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The process of determining cuts tuition for students are usually given with the same nominal. And in this paper is the determination of the pieces tuition for students who are less able to be different, depending on how much income parents and the number of children covered. For income parents who get discounted tuition fee of IDR Rp.1,500,000 and for the number of children in these families also determine the number of pieces obtained. Tsukamoto Fuzzy system is the model used in this paper. Each input variable is divided into three membership functions. In this paper, Nine Tsukamoto Fuzzy model rules have been applied. The system also provides a consequent change of parameters if the current parameter values to be changed. The smaller the parent's income, the greater the pieces obtained. The more children insured the greater the college acquired pieces.
There are subsets of genes that have similar behavior under subsets of conditions, so we say
that they coexpress, but behave independently under other subsets of conditions. Discovering
such coexpressions can be helpful to uncover genomic knowledge such as gene networks or
gene interactions. That is why, it is of utmost importance to make a simultaneous clustering of
genes and conditions to identify clusters of genes that are coexpressed under clusters of
conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to
approximate this problem by finding suboptimal solutions. In this paper, we make a new survey
on biclustering of gene expression data, also called microarray data.
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Integrated bio-search approaches with multi-objective algorithms for optimiza...TELKOMNIKA JOURNAL
Optimal selection of features is very difficult and crucial to achieve, particularly for the task of classification. It is due to the traditional method of selecting features that function independently and generated the collection of irrelevant features, which therefore affects the quality of the accuracy of the classification. The goal of this paper is to leverage the potential of bio-inspired search algorithms, together with wrapper, in optimizing multi-objective algorithms, namely ENORA and NSGA-II to generate an optimal set of features. The main steps are to idealize the combination of ENORA and NSGA-II with suitable bio-search algorithms where multiple subset generation has been implemented. The next step is to validate the optimum feature set by conducting a subset evaluation. Eight (8) comparison datasets of various sizes have been deliberately selected to be checked. Results shown that the ideal combination of multi-objective algorithms, namely ENORA and NSGA-II, with the selected bio-inspired search algorithm is promising to achieve a better optimal solution (i.e. a best features with higher classification accuracy) for the selected datasets. This discovery implies that the ability of bio-inspired wrapper/filtered system algorithms will boost the efficiency of ENORA and NSGA-II for the task of selecting and classifying features.
A Hybrid method of face detection based on Feature Extraction using PIFR and ...IJERA Editor
In this paper we proposed a face detection method based on feature selection and feature optimization. Now in
current research trend of biometric security used the process of feature optimization for better improvement of
face detection technique. Basically our face consists of three types of feature such as skin color, texture and
shape and size of face. The most important feature of face is skin color and texture of face. In this detection
technique used texture feature of face image. For the texture extraction of image face used partial feature
extraction function, these function is most promising shape feature analysis. For the selection of feature and
optimization of feature used multi-objective TLBO. TLBO algorithm is population based searching technique
and defines two constraints function for the process of selection and optimization. The proposed algorithm of
face detection based on feature selection and feature optimization process. Initially used face image data base
and passes through partial feature extractor function and these transform function gives a texture feature of face
image. For the evaluation of performance our proposed algorithm implemented in MATLAB 7.8.0 software and
face image used provided by Google face image database. For numerical analysis of result used hit and miss
ratio. Our empirical evaluation of result shows better prediction result in compression of PIFR method of face
detection.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The process of determining cuts tuition for students are usually given with the same nominal. And in this paper is the determination of the pieces tuition for students who are less able to be different, depending on how much income parents and the number of children covered. For income parents who get discounted tuition fee of IDR Rp.1,500,000 and for the number of children in these families also determine the number of pieces obtained. Tsukamoto Fuzzy system is the model used in this paper. Each input variable is divided into three membership functions. In this paper, Nine Tsukamoto Fuzzy model rules have been applied. The system also provides a consequent change of parameters if the current parameter values to be changed. The smaller the parent's income, the greater the pieces obtained. The more children insured the greater the college acquired pieces.
There are subsets of genes that have similar behavior under subsets of conditions, so we say
that they coexpress, but behave independently under other subsets of conditions. Discovering
such coexpressions can be helpful to uncover genomic knowledge such as gene networks or
gene interactions. That is why, it is of utmost importance to make a simultaneous clustering of
genes and conditions to identify clusters of genes that are coexpressed under clusters of
conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to
approximate this problem by finding suboptimal solutions. In this paper, we make a new survey
on biclustering of gene expression data, also called microarray data.
A Study on Learning Factor Analysis – An Educational Data Mining Technique fo...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Integrated bio-search approaches with multi-objective algorithms for optimiza...TELKOMNIKA JOURNAL
Optimal selection of features is very difficult and crucial to achieve, particularly for the task of classification. It is due to the traditional method of selecting features that function independently and generated the collection of irrelevant features, which therefore affects the quality of the accuracy of the classification. The goal of this paper is to leverage the potential of bio-inspired search algorithms, together with wrapper, in optimizing multi-objective algorithms, namely ENORA and NSGA-II to generate an optimal set of features. The main steps are to idealize the combination of ENORA and NSGA-II with suitable bio-search algorithms where multiple subset generation has been implemented. The next step is to validate the optimum feature set by conducting a subset evaluation. Eight (8) comparison datasets of various sizes have been deliberately selected to be checked. Results shown that the ideal combination of multi-objective algorithms, namely ENORA and NSGA-II, with the selected bio-inspired search algorithm is promising to achieve a better optimal solution (i.e. a best features with higher classification accuracy) for the selected datasets. This discovery implies that the ability of bio-inspired wrapper/filtered system algorithms will boost the efficiency of ENORA and NSGA-II for the task of selecting and classifying features.
A Hybrid method of face detection based on Feature Extraction using PIFR and ...IJERA Editor
In this paper we proposed a face detection method based on feature selection and feature optimization. Now in
current research trend of biometric security used the process of feature optimization for better improvement of
face detection technique. Basically our face consists of three types of feature such as skin color, texture and
shape and size of face. The most important feature of face is skin color and texture of face. In this detection
technique used texture feature of face image. For the texture extraction of image face used partial feature
extraction function, these function is most promising shape feature analysis. For the selection of feature and
optimization of feature used multi-objective TLBO. TLBO algorithm is population based searching technique
and defines two constraints function for the process of selection and optimization. The proposed algorithm of
face detection based on feature selection and feature optimization process. Initially used face image data base
and passes through partial feature extractor function and these transform function gives a texture feature of face
image. For the evaluation of performance our proposed algorithm implemented in MATLAB 7.8.0 software and
face image used provided by Google face image database. For numerical analysis of result used hit and miss
ratio. Our empirical evaluation of result shows better prediction result in compression of PIFR method of face
detection.
A comparative study of clustering and biclustering of microarray dataijcsit
There are subsets of genes that have similar behavior under subsets of conditions, so we say that they
coexpress, but behave independently under other subsets of conditions. Discovering such coexpressions can
be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of
utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes
that are coexpressed under clusters of conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate
this problem by finding suboptimal solutions. In this paper, we make a new survey on clustering and
biclustering of gene expression data, also called microarray data.
The Efficiency of Electrochemistry Manuals through Illustration (I) or Explan...iosrjce
This paper will discuss about the performances in Electrochemistry Final Examination (EFE) for
some Form 4 students from three schools at LMS, Perak. The students first were sitting for pre-testsMotivational
Level (ML), Puzzle Cards (PC), Logical Thinking (LT), Scientific Reasoning Skills (SRS), and
Electrochemistry Final Exam (EFE). Three manuals were used- Illustrations (I), Explanation using Sentences
(EuSM), and Ministry of Education Chemistry Textbooks (T). After the treatments using these manuals, students
were sitting for post-tests- ML, -PC, - LT, -SRS, and -EFE. The data were then analyzed with One-Way ANOVA
Test (Repeated) using IBM SPSS Statistics Software 21.0 to determine whether there will be improvements in the
post-tests after using these manuals.
Multimodal authentication is one of the prime concepts in current applications of real scenario. Various
approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a
framework for providing more secure key in biometric security aspect. Initially the features will be
extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique
key components will be extracted, then selected with different key sizes and then combined the selected key
components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive
Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done
and then verified with the measure MSE. This model would give better outcome when compared with SVD
factorization[1] as feature selection. The process will be computed for different key sizes and the results
will be presented.
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...IJECEIAES
The variable selection is an important technique the reducing dimensionality of data frequently used in data preprocessing for performing data mining. This paper presents a new variable selection algorithm uses the heuristic variable selection (HVS) and Minimum Redundancy Maximum Relevance (MRMR). We enhance the HVS method for variab le selection by incorporating (MRMR) filter. Our algorithm is based on wrapper approach using multi-layer perceptron. We called this algorithm a HVS-MRMR Wrapper for variables selection. The relevance of a set of variables is measured by a convex combination of the relevance given by HVS criterion and the MRMR criterion. This approach selects new relevant variables; we evaluate the performance of HVS-MRMR on eight benchmark classification problems. The experimental results show that HVS-MRMR selected a less number of variables with high classification accuracy compared to MRMR and HVS and without variables selection on most datasets. HVS-MRMR can be applied to various classification problems that require high classification accuracy.
Fuzzy Association Rule Mining based Model to Predict Students’ Performance IJECEIAES
The major intention of higher education institutions is to supply quality education to its students. One approach to get maximum level of quality in higher education system is by discovering knowledge for prediction regarding the internal assessment and end semester examination. The projected work intends to approach this objective by taking the advantage of fuzzy inference technique to classify student scores data according to the level of their performance. In this paper, student’s performance is evaluated using fuzzy association rule mining that describes Prediction of performance of the students at the end of the semester, on the basis of previous database like Attendance, Midsem Marks, Previous semester marks and Previous Academic Records were collected from the student’s previous database, to identify those students which needed individual attention to decrease fail ration and taking suitable action for the next semester examination.
The process of determining eligibility for someone is usually given with the same value. The determination of eligibility is determined based on several criteria. These criteria are the ability to Academic Potential Test (APT) and Grade Point Average (GPA). The Tsukamoto fuzzy system is the model used in this paper. Each input variable is divided into two membership functions. There are nine rules of Tsukamoto's model applied. The system also provides following changes of parameters if the parameter values are to be changed. The result of the difference of the employability is given to them. The greater the APT score, the more the value of the feasibility of the work obtained. The more GPA values gained, the greater the value of the workplace eligibility.
New instances classification framework on Quran ontology applied to question ...TELKOMNIKA JOURNAL
Instances classification with the small dataset for Quran ontology is the current research problem which appears in Quran ontology development. The existing classification approach used machine learning: Backpropagation Neural Network. However, this method has a drawback; if the training set amount is small, then the classifier accuracy could decline. Unfortunately, Holy Quran has a small corpus. Based on this problem, our study aims to formulate new instances classification framework for small training corpus applied to semantic question answering system. As a result, the instances classification framework consists of several essential components: pre-processing, morphology analysis, semantic analysis, feature extraction, instances classification with Radial Basis Function Networks algorithm, and the transformation module. This algorithm is chosen since it robustness to noisy data and has an excellent achievement to handle small dataset. Furthermore, document processing module on question answering system is used to access instances classification result in Quran ontology.
In real-life decisions, usually we happen to suffer through different states of uncertainties. In order to counter these uncertainties, in this paper, the author formulated a transportation problem in which costs are triangular intuitionistic fuzzy numbers, supplies and demands are crisp numbers. In this paper, a simple method for solving type-2 intuitionistic fuzzy transportation problem (type-2 IFTP) is proposed and optimal solution is obtained without using intuitionistic fuzzy modified distribution method and intuitionistic fuzzy zero point method. So, the proposed method gives the optimal solution directly. The solution procedure is illustrated with the help of three real life numerical examples. Defect of existing results proposed by Singh and Yadav (2016a) is discussed. Validity of Pandian’s (2014) method is reviewed. Finally, the comparative study, results and discussion are given.
Implementation of AHP-MAUT and AHP-Profile Matching Methods in OJT Student Pl...Gede Surya Mahendra
ABSTRACT
To improve the quality and quality of employment, OJT is very much needed by Monarch Bali students, but the process, which is still manual, makes decisions that are taken less fast, accurate, effective and efficient. In line with the roadmap of Monarch Bali, it is necessary to develop an automation system to be able to improve the performance of decision making for OJT student placement by making a DSS. The method used in this research is AHP-MAUT and AHP-PM. The decision makers in this study were 3 people, and out of a total of 500 OJT students, 8 OJT students for F&B class, 12 OJT students for Housekeeping class, 13 OJT students for Catering class, and 17 OJT students for Food Management class with a total of 50 OJT students. Implementation of AHP-MAUT, OJT students from the F&B class with the code StudentD04 have the highest preference value of 0.5724, and OJT students from the beverage class with the code StudentA02 have a preference value of 4.1155 calculated using AHP-PM, each being ranked first.
Keywords:
Analytical Hierarchy Process, Multi-Attribute Utility Theory, Profile Matching,
CRISP-DM,
On the Job Training
Constructing a classification model is important in machine learning for a particular task. A
classification process involves assigning objects into predefined groups or classes based on a
number of observed attributes related to those objects. Artificial neural network is one of the
classification algorithms which, can be used in many application areas. This paper investigates
the potential of applying the feed forward neural network architecture for the classification of
medical datasets. Migration based differential evolution algorithm (MBDE) is chosen and
applied to feed forward neural network to enhance the learning process and the network
learning is validated in terms of convergence rate and classification accuracy. In this paper,
MBDE algorithm with various migration policies is proposed for classification problems using
medical diagnosis.
Sparse representation based classification of mr images of brain for alzheime...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Properties of CdS Chemically Deposited thin films on the Effect of Ammonia Co...IOSR Journals
The effect of ammonia concentration on electrical properties, optical properties and structural properties of chemical bath deposited (CBD) Cadmium sulphide (CdS) thin films has been revealed. The films were prepared by using cadmium acetate as cadmium ion (Cd2+) source, thiourea as sulphur ion (S2-) source and ammonia as the complexing agent. Ammonia concentration was changed from 0.1 M – 3.0 M. Ammonia concentration at 2.0 M uniform, dense and continuously coated films were obtained. Not only typical cadmium-pure but also unusual sulphur deficiency phenomena were observed for CBD CdS thin films. In the present investigation, the carrier concentration varied form 1.831X106cm-3 to 1.026X106cm-3 when ammonia concentration is changed from 0.5M to 2.5 M. The direct band gap energy at 0.5M is 1.92eV while at 2.5M is 2.65eV. The surface morphology of as deposited thin films is almost smooth and no grains were observed clearly at low molar concentration and predominant grains at the concentration of ammonia is 2.0M. By estimated Cd:S ratio value is found to be 1.04 by using EDAX. The thin film deposited at 2.0M concentration shows the highest degree crystallinity. The formation mechanism of the films with various ammonia concentrations is discussed.
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...IOSR Journals
Abstract: In this paper we have designed and implemented(15, k) a BCH Encoder on FPGA using VHDL for reliable data transfers in AWGN channel with multiple error correction control. The digital logic implementation of binary encoding of multiple error correcting BCH code (15, k) of length n=15 over GF (24) with irreducible primitive polynomial x4+x+1 is organized into shift register circuits. Using the cyclic codes, the reminder b(x) can be obtained in a linear (15-k) stage shift register with feedback connections corresponding to the coefficients of the generated polynomial. Three encoder are designed using VHDL to encode the single, double and triple error correcting BCH code (15, k) corresponding to the coefficient of generated polynomial. Information bit is transmitted in unchanged form up to k clock cycles and during this period parity bits are calculated in the LFSR then the parity bits are transmitted from k+1 to 15 clock cycles. Total 15-k numbers of parity bits with k information bits are transmitted in 15 code word. Here we have implemented (15, 5, 3), (15, 7, 2) and (15, 11, 1) BCH code encoder on Xilinx Spartan 3 FPGA using VHDL and the simulation & synthesis are done using Xilinx ISE 13.3. BCH encoders are conventionally implemented by linear feedback shift register architecture. Encoders of long BCH codes may suffer from the effect of large fan out, which may reduce the achievable clock speed. The data rate requirement of optical applications require parallel implementations of the BCH encoders. Also a comparative performance based on synthesis & simulation on FPGA is presented. Keywords: BCH, BCH Encoder, FPGA, VHDL, Error Correction, AWGN, LFSR cyclic redundancy checking, fan out .
A comparative study of clustering and biclustering of microarray dataijcsit
There are subsets of genes that have similar behavior under subsets of conditions, so we say that they
coexpress, but behave independently under other subsets of conditions. Discovering such coexpressions can
be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of
utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes
that are coexpressed under clusters of conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate
this problem by finding suboptimal solutions. In this paper, we make a new survey on clustering and
biclustering of gene expression data, also called microarray data.
The Efficiency of Electrochemistry Manuals through Illustration (I) or Explan...iosrjce
This paper will discuss about the performances in Electrochemistry Final Examination (EFE) for
some Form 4 students from three schools at LMS, Perak. The students first were sitting for pre-testsMotivational
Level (ML), Puzzle Cards (PC), Logical Thinking (LT), Scientific Reasoning Skills (SRS), and
Electrochemistry Final Exam (EFE). Three manuals were used- Illustrations (I), Explanation using Sentences
(EuSM), and Ministry of Education Chemistry Textbooks (T). After the treatments using these manuals, students
were sitting for post-tests- ML, -PC, - LT, -SRS, and -EFE. The data were then analyzed with One-Way ANOVA
Test (Repeated) using IBM SPSS Statistics Software 21.0 to determine whether there will be improvements in the
post-tests after using these manuals.
Multimodal authentication is one of the prime concepts in current applications of real scenario. Various
approaches have been proposed in this aspect. In this paper, an intuitive strategy is proposed as a
framework for providing more secure key in biometric security aspect. Initially the features will be
extracted through PCA by SVD from the chosen biometric patterns, then using LU factorization technique
key components will be extracted, then selected with different key sizes and then combined the selected key
components using convolution kernel method (Exponential Kronecker Product - eKP) as Context-Sensitive
Exponent Associative Memory model (CSEAM). In the similar way, the verification process will be done
and then verified with the measure MSE. This model would give better outcome when compared with SVD
factorization[1] as feature selection. The process will be computed for different key sizes and the results
will be presented.
Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural...IJECEIAES
The variable selection is an important technique the reducing dimensionality of data frequently used in data preprocessing for performing data mining. This paper presents a new variable selection algorithm uses the heuristic variable selection (HVS) and Minimum Redundancy Maximum Relevance (MRMR). We enhance the HVS method for variab le selection by incorporating (MRMR) filter. Our algorithm is based on wrapper approach using multi-layer perceptron. We called this algorithm a HVS-MRMR Wrapper for variables selection. The relevance of a set of variables is measured by a convex combination of the relevance given by HVS criterion and the MRMR criterion. This approach selects new relevant variables; we evaluate the performance of HVS-MRMR on eight benchmark classification problems. The experimental results show that HVS-MRMR selected a less number of variables with high classification accuracy compared to MRMR and HVS and without variables selection on most datasets. HVS-MRMR can be applied to various classification problems that require high classification accuracy.
Fuzzy Association Rule Mining based Model to Predict Students’ Performance IJECEIAES
The major intention of higher education institutions is to supply quality education to its students. One approach to get maximum level of quality in higher education system is by discovering knowledge for prediction regarding the internal assessment and end semester examination. The projected work intends to approach this objective by taking the advantage of fuzzy inference technique to classify student scores data according to the level of their performance. In this paper, student’s performance is evaluated using fuzzy association rule mining that describes Prediction of performance of the students at the end of the semester, on the basis of previous database like Attendance, Midsem Marks, Previous semester marks and Previous Academic Records were collected from the student’s previous database, to identify those students which needed individual attention to decrease fail ration and taking suitable action for the next semester examination.
The process of determining eligibility for someone is usually given with the same value. The determination of eligibility is determined based on several criteria. These criteria are the ability to Academic Potential Test (APT) and Grade Point Average (GPA). The Tsukamoto fuzzy system is the model used in this paper. Each input variable is divided into two membership functions. There are nine rules of Tsukamoto's model applied. The system also provides following changes of parameters if the parameter values are to be changed. The result of the difference of the employability is given to them. The greater the APT score, the more the value of the feasibility of the work obtained. The more GPA values gained, the greater the value of the workplace eligibility.
New instances classification framework on Quran ontology applied to question ...TELKOMNIKA JOURNAL
Instances classification with the small dataset for Quran ontology is the current research problem which appears in Quran ontology development. The existing classification approach used machine learning: Backpropagation Neural Network. However, this method has a drawback; if the training set amount is small, then the classifier accuracy could decline. Unfortunately, Holy Quran has a small corpus. Based on this problem, our study aims to formulate new instances classification framework for small training corpus applied to semantic question answering system. As a result, the instances classification framework consists of several essential components: pre-processing, morphology analysis, semantic analysis, feature extraction, instances classification with Radial Basis Function Networks algorithm, and the transformation module. This algorithm is chosen since it robustness to noisy data and has an excellent achievement to handle small dataset. Furthermore, document processing module on question answering system is used to access instances classification result in Quran ontology.
In real-life decisions, usually we happen to suffer through different states of uncertainties. In order to counter these uncertainties, in this paper, the author formulated a transportation problem in which costs are triangular intuitionistic fuzzy numbers, supplies and demands are crisp numbers. In this paper, a simple method for solving type-2 intuitionistic fuzzy transportation problem (type-2 IFTP) is proposed and optimal solution is obtained without using intuitionistic fuzzy modified distribution method and intuitionistic fuzzy zero point method. So, the proposed method gives the optimal solution directly. The solution procedure is illustrated with the help of three real life numerical examples. Defect of existing results proposed by Singh and Yadav (2016a) is discussed. Validity of Pandian’s (2014) method is reviewed. Finally, the comparative study, results and discussion are given.
Implementation of AHP-MAUT and AHP-Profile Matching Methods in OJT Student Pl...Gede Surya Mahendra
ABSTRACT
To improve the quality and quality of employment, OJT is very much needed by Monarch Bali students, but the process, which is still manual, makes decisions that are taken less fast, accurate, effective and efficient. In line with the roadmap of Monarch Bali, it is necessary to develop an automation system to be able to improve the performance of decision making for OJT student placement by making a DSS. The method used in this research is AHP-MAUT and AHP-PM. The decision makers in this study were 3 people, and out of a total of 500 OJT students, 8 OJT students for F&B class, 12 OJT students for Housekeeping class, 13 OJT students for Catering class, and 17 OJT students for Food Management class with a total of 50 OJT students. Implementation of AHP-MAUT, OJT students from the F&B class with the code StudentD04 have the highest preference value of 0.5724, and OJT students from the beverage class with the code StudentA02 have a preference value of 4.1155 calculated using AHP-PM, each being ranked first.
Keywords:
Analytical Hierarchy Process, Multi-Attribute Utility Theory, Profile Matching,
CRISP-DM,
On the Job Training
Constructing a classification model is important in machine learning for a particular task. A
classification process involves assigning objects into predefined groups or classes based on a
number of observed attributes related to those objects. Artificial neural network is one of the
classification algorithms which, can be used in many application areas. This paper investigates
the potential of applying the feed forward neural network architecture for the classification of
medical datasets. Migration based differential evolution algorithm (MBDE) is chosen and
applied to feed forward neural network to enhance the learning process and the network
learning is validated in terms of convergence rate and classification accuracy. In this paper,
MBDE algorithm with various migration policies is proposed for classification problems using
medical diagnosis.
Sparse representation based classification of mr images of brain for alzheime...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Properties of CdS Chemically Deposited thin films on the Effect of Ammonia Co...IOSR Journals
The effect of ammonia concentration on electrical properties, optical properties and structural properties of chemical bath deposited (CBD) Cadmium sulphide (CdS) thin films has been revealed. The films were prepared by using cadmium acetate as cadmium ion (Cd2+) source, thiourea as sulphur ion (S2-) source and ammonia as the complexing agent. Ammonia concentration was changed from 0.1 M – 3.0 M. Ammonia concentration at 2.0 M uniform, dense and continuously coated films were obtained. Not only typical cadmium-pure but also unusual sulphur deficiency phenomena were observed for CBD CdS thin films. In the present investigation, the carrier concentration varied form 1.831X106cm-3 to 1.026X106cm-3 when ammonia concentration is changed from 0.5M to 2.5 M. The direct band gap energy at 0.5M is 1.92eV while at 2.5M is 2.65eV. The surface morphology of as deposited thin films is almost smooth and no grains were observed clearly at low molar concentration and predominant grains at the concentration of ammonia is 2.0M. By estimated Cd:S ratio value is found to be 1.04 by using EDAX. The thin film deposited at 2.0M concentration shows the highest degree crystallinity. The formation mechanism of the films with various ammonia concentrations is discussed.
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...IOSR Journals
Abstract: In this paper we have designed and implemented(15, k) a BCH Encoder on FPGA using VHDL for reliable data transfers in AWGN channel with multiple error correction control. The digital logic implementation of binary encoding of multiple error correcting BCH code (15, k) of length n=15 over GF (24) with irreducible primitive polynomial x4+x+1 is organized into shift register circuits. Using the cyclic codes, the reminder b(x) can be obtained in a linear (15-k) stage shift register with feedback connections corresponding to the coefficients of the generated polynomial. Three encoder are designed using VHDL to encode the single, double and triple error correcting BCH code (15, k) corresponding to the coefficient of generated polynomial. Information bit is transmitted in unchanged form up to k clock cycles and during this period parity bits are calculated in the LFSR then the parity bits are transmitted from k+1 to 15 clock cycles. Total 15-k numbers of parity bits with k information bits are transmitted in 15 code word. Here we have implemented (15, 5, 3), (15, 7, 2) and (15, 11, 1) BCH code encoder on Xilinx Spartan 3 FPGA using VHDL and the simulation & synthesis are done using Xilinx ISE 13.3. BCH encoders are conventionally implemented by linear feedback shift register architecture. Encoders of long BCH codes may suffer from the effect of large fan out, which may reduce the achievable clock speed. The data rate requirement of optical applications require parallel implementations of the BCH encoders. Also a comparative performance based on synthesis & simulation on FPGA is presented. Keywords: BCH, BCH Encoder, FPGA, VHDL, Error Correction, AWGN, LFSR cyclic redundancy checking, fan out .
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
The demographic environment is of major interest to marketers because it involves people and people make up market. Fragmentation of the mass market into numerous micro markets differentiated by age, sex, education, life style, geography and so on. Because each group has strong preferences and consumer characteristics that can be easily reached through increasingly targeted communication and distribution channels. Most of marketers’ strategic decision making heavily depend on the demographic variables of people in the region where they focus on marketing their products. This study makes known the vital demographic structure of premium car owners in Chennai city and provides models for predicting the consumer’s decision to buy a car when his exact demographic profile is known. The relationship established between the demographic variables and the different stages of consumer’s purchase decision process further helps identifying the significant demographic variables. This will be definitely helpful to the marketers of cars to know their target group and to evolve marketing strategies to make them becoming a car owner.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.IOSR Journals
Abstract: A monopole antenna is a type of radio antenna formed by replacing one half of a dipole antenna with a ground plane at right-angles to the remaining half. Monopoles may be used from a few hundred KHz through several GHz in frequency and are commonly one-quarter of a wave length long, but may be shorter or longer. Monopole antennas exhibit high gain and improved efficiency in a surprisingly small package. Monopole antenna can be designed to exhibit wideband capabilities. The different available monopole antennas are dual band printed monopole antenna, cross-slot monopole antenna, U-shaped monopole antenna, triangular shaped monopole antenna and a wideband monopole antenna. This paper deals with the comparison obtained from the results such as return loss, VSWR, current distribution, and the radiation pattern of simple U-shaped and complete monopole antenna. Keywords- CPW, CST, FR4, LAN, WiMAX
Non- Newtonian behavior of blood in very narrow vesselsIOSR Journals
The purpose of the study is to get some qualitative and quantitative insight into the problem of flow in vessels under consideration where the concentration of lubrication film of plasma is present between each red cells and tube wall. This film is potentially important in region to mass transfer and to hydraulic resistance, as well as to the relative resistance times of red cells and plasma in the vessels network.
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
The agriculture sector which employs more than 55% of the country workforce whereas share of agriculture and allied sector to total GDP is 14.1% (2011-12). The farm sector achieved 3.6% growth during the 11th Five Year Plan (2007-12), falling short of the 4% growth target, although it was much higher than growth of 2.5 and 2.4% during 9th and 10th plan respectively. Thus, the sector needs urgent reforms to boost crop yields and private investment in infrastructure so as to motivate farmers and feed the growing population. At the latest Economic Survey (2012-13) points out that “India is at a juncture where further reforms are urgently required to achieve greater efficiency and productivity in agriculture for sustaining growth. There is a need to have stable and consistent policies where markets play a deserving role and private investment in infrastructure is stepped up. An efficient supply chaim that firmly establishes the linkage between retail demand and the farmer will be important”
LEMON : THE LEARNING EFFICIENCY COMPUTATION MODEL FOR ASSESSING LEARNER CONTE...IJITE
Current E-learning systems are focusing on providing learning solutions depending upon the context of the
learner. Efforts have been put in the delivery of contents, learning path and support based on the learner
context. As the learner’s context serves as base for triggering adaptation of learning solutions, a clear
understanding and an accurate definition of learner context is necessary. Different perspectives of context
have been discussed in literature. In this paper a different perspective for defining learner context is
employed and a feature viz. Learning Efficiency that consolidates the learner context has been arrived. The
different elements that constitute Learning efficiency have been identified using which a computational
model of Learning Efficiency called LEMOn has been proposed in order to quantify the learner context.
The model has been subjected to statistical evaluation in order to check for its correctness and was found
to represent the learner context efficiently.
Applying adaptive learning by integrating semantic and machine learning in p...IJECEIAES
Adaptive learning is one of the most widely used data driven approach to teaching and it received an increasing attention over the last decade. It aims to meet the student’s characteristics by tailoring learning courses materials and assessment methods. In order to determine the student’s characteristics, we need to detect their learning styles according to visual, auditory or kinaesthetic (VAK) learning style. In this research, an integrated model that utilizes both semantic and machine learning clustering methods is developed in order to cluster students to detect their learning styles and recommend suitable assessment method(s) accordingly. In order to measure the effectiveness of the proposed model, a set of experiments were conducted on real dataset (Open University Learning Analytics Dataset). Experiments showed that the proposed model is able to cluster students according to their different learning activities with an accuracy that exceeds 95% and predict their relative assessment method(s) with an average accuracy equals to 93%.
Educational Data Mining is used to find interesting patterns from the data taken from
educational settings to improve teaching and learning. Assessing student’s ability and performance with
EDM methods in e-learning environment for math education in school level in India has not been
identified in our literature review. Our method is a novel approach in providing quality math education
with assessments indicating the knowledge level of a student in each lesson. This paper illustrates how
Learning Curve – an EDM visualization method is used to compare rural and urban students’ progress
in learning mathematics in an e-learning environment. The experiment is conducted in two different
schools in Tamil Nadu, India. After practicing the problems the students attended the test and their
interaction data are collected and analyzed their performance in different aspects: Knowledge
component level, time taken to solve a problem, error rate. This work studies the student actions for
identifying learning progress. The results show that the learning curve method is much helpful to the
teachers to visualize the students’ performance in granular level which is not possible manually. Also it
helps the students in knowing about their skill level when they complete each unit.
Clustering analysis of learning style on anggana high school studentTELKOMNIKA JOURNAL
The inability of students to absorb the knowledge conveyed by the teacher is’nt caused by the inability of understanding and by the teacher which isn’t able to teach too, but because of the mismatch of learning styles between students and teachers, so that students feel uncomfortable in learning to a particular teacher. It also happens in senior high school (SHS/SMAN) 1 Anggana, so it is necessary to do this research, to analyze cluster (group) of student learning style by applying data mining method that is k-Means and Fuzzy C-Means. The purpose was to know the effectiveness of this learning style cluster on the development of absorptive power and improving student achievement. The method used to cluster the learning style with data mining process starts from the data cleaning stage, data selection, data transformation, data mining, pattern evolution, and knowledge development.
State of the art of learning styles based adaptive educational hypermedia sys...ijcsit
The notion that learning can be enhanced when a teaching approach matches a learner’s learning style has
been widely accepted in classroom settings since the latter represents a predictor of student’s attitude and
preferences. As such, the traditional approach of ‘one-size-fits-all’ as may be applied to teaching delivery
in Educational Hypermedia Systems (EHSs) has to be changed with an approach that responds to users’
needs by exploiting their individual differences. However, establishing and implementing reliable
approaches for matching the teaching delivery and modalities to learning styles still represents an
innovation challenge which has to be tackled. In this paper, seventy six studies are objectively analysed for
several goals. In order to reveal the value of integrating learning styles in EHSs, different perspectives in
this context are discussed. Identifying the most effective learning style models as incorporated within
AEHSs. Investigating the effectiveness of different approaches for modelling students’ individual learning
traits is another goal of this study. Thus, the paper highlights a number of theoretical and technical issues
of LS-BAEHSs to serve as a comprehensive guidance for researchers who interest in this area.
Visual representation and organization of the knowledge have been utilized in different ways in tutoring
systems to upgrade their usefulness. This paper concentrates on the usage of various graphical formalisms,
for example, the conceptual graph, ontology, and concept map in tutoring systems. The paper addresses
what is way of the utilization of every formalism and the offering of the potential outcomes to assist the
student in education systems.
GRAPHICAL REPRESENTATION IN TUTORING SYSTEMSijcsit
Visual representation and organization of the knowledge have been utilized in different ways in tutoring systems to upgrade their usefulness. This paper concentrates on the usage of various graphical formalisms, for example, the conceptual graph, ontology, and concept map in tutoring systems. The paper addresses what is way of the utilization of every formalism and the offering of the potential outcomes to assist the student in education systems.
Visual representation and organization of the knowledge have been utilized in different ways in tutoring systems to upgrade their usefulness. This paper concentrates on the usage of various graphical formalisms, for example, the conceptual graph, ontology, and concept map in tutoring systems. The paper addresses what is way of the utilization of every formalism and the offering of the potential outcomes to assist the student in education systems.
Towards a new ontology of the Moroccan Post-baccalaureate learner profile for...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Adaptive Learning Management System Using Semantic Web Technologies ijsc
Ontologies and semantic web services are the basics of next generation semantic web. This upcoming technologies are useful in many fields such as bioinformatics, business collaboration, Data integration and etc. E-learning is also the field in which semantic web technologies can be used to provide dynamism in learning methodologies. E-learning includes set of tasks which may be instructional design, content development, authoring, delivery, assessment, feedback and etc. that can be sequenced and composed as workflow. Web based Learning Management Systems should concentrate on how to satisfy the e-learners requirements. In this paper we have suggested the theoretical framework ALMS-Adaptive Learning management System which focuses on three aspects 1) Extracting the knowledge from the use's interaction, behaviour and actions and translate them into semantics which are represented as Ontologies 2) Find the Learner style from the knowledge base and 3)deriving and composing the workflow depending upon the learner style. The intelligent agents are used in each module of the framework to perform reasoning and finally the personalized workflow for the e-learner has been recommended.
ADAPTIVE LEARNING MANAGEMENT SYSTEM USING SEMANTIC WEB TECHNOLOGIESijsc
Ontologies and semantic web services are the basics of next generation semantic web. This upcoming
technologies are useful in many fields such as bioinformatics, business collaboration, Data integration and
etc. E-learning is also the field in which semantic web technologies can be used to provide dynamism in
learning methodologies. E-learning includes set of tasks which may be instructional design, content
development, authoring, delivery, assessment, feedback and etc. that can be sequenced and composed as
workflow. Web based Learning Management Systems should concentrate on how to satisfy the e-learners
requirements. In this paper we have suggested the theoretical framework ALMS-Adaptive Learning
management System which focuses on three aspects 1) Extracting the knowledge from the use's interaction,
behaviour and actions and translate them into semantics which are represented as Ontologies 2) Find the
Learner style from the knowledge base and 3)deriving and composing the workflow depending upon the
learner style. The intelligent agents are used in each module of the framework to perform reasoning and
finally the personalized workflow for the e-learner has been recommended.
Comparison Intelligent Electronic Assessment with Traditional Assessment for ...CSEIJJournal
In education, the use of electronic (E) examination systems is not a novel idea, as E-examination systems
have been used to conduct objective assessments for the last few years. This research deals with randomly
designed E-examinations and proposes an E-assessment system that can be used for subjective questions.
This system assesses answers to subjective questions by finding a matching ratio for the keywords in
instructor and student answers. The matching ratio is achieved based on semantic and document similarity.
The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and
grading. A survey and case study were used in the research design to validate the proposed system. The
examination assessment system will help instructors to save time, costs, and resources, while increasing
efficiency and improving the productivity of exam setting and assessments.
COMPARISON INTELLIGENT ELECTRONIC ASSESSMENT WITH TRADITIONAL ASSESSMENT FOR ...cseij
In education, the use of electronic (E) examination systems is not a novel idea, as E-examination systems
have been used to conduct objective assessments for the last few years. This research deals with randomly
designed E-examinations and proposes an E-assessment system that can be used for subjective questions.
This system assesses answers to subjective questions by finding a matching ratio for the keywords in
instructor and student answers.
COMPARISON INTELLIGENT ELECTRONIC ASSESSMENT WITH TRADITIONAL ASSESSMENT FOR ...cseij
In education, the use of electronic (E) examination systems is not a novel idea, as E-examination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity.
The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
COMPARISON INTELLIGENT ELECTRONIC ASSESSMENT WITH TRADITIONAL ASSESSMENT FOR ...cseij
In education, the use of electronic (E) examination systems is not a novel idea, as E-examination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
C1802041824
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. IV (Mar-Apr. 2016), PP 18-24
www.iosrjournals.org
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 18 | Page
Learner Model for Automatic Detection of Learning Style Using
FCM in Adaptive E-Learning System
Soni Sweta1
, Kanhaiya Lal 2
1,2
(Department Of Computer Science And Engineering Mesra, (Patna) Ranchi,India)
Abstract : The aim of this paper is to introduce an automatic student modeling approach for identifying
learning style in learning management systems according to Felder Silverman Learning Style Model
(FSLSM).This paper proposes the use of fuzzy cognitive maps FCMs as a tool for identifying learner’s learning
style to individualizing each learner’s according to their needs. FCMs are a soft computing tool which is a
combination of fuzzy logic and neural network. Result shows that according to this model student learning style
can be detected which give high precision value.
Keywords: Adaptive e-learning, Fuzzy cognitive map, Individualize, Learning Process, Personalized Learning
I. Introduction
In order to optimize and facilitate learners‟ interaction with a web-based educational system, one must
first decide on the human factors that have been taken into consideration and precisely identify the real needs of
the students. The focus of this paper is on learning style as one individual is different from the others in many
ways which play an important role in learning, according to educational psychologists. Learning style refers to
the individual‟s traits in which a learner approaches a learning task [2] and learning process. Learning styles
which refer to learner‟s preferred ways to learn can play an important role in adaptive e- learning systems [3].
With the knowledge of different styles, the system can provide personalized adaptive recommendations to the
learners to optimize learning process and improve effectiveness. Moreover, e-learning system which allows
computerized and statistical algorithms opens the opportunity to overcome drawbacks of the traditional
detection method that uses mainly questionnaire[3].There are many learning style models described in
literature[4][5][6], which show that every individual prefers to learn in different learning style. According to
above theories, adaptive e-learning system can also strengthen above concept so that incorporating student
learning style definitely enhances the learning process of learner [1]. In this paper, authors describe how
learning process influenced by learning styles because preferred mode of input varies from individual to
individual. In this paper, a new method is proposed that automatically detect‟ learning styles with respect to the
Felder- Silverman Learning Style Model based on their learning behaviors in e-learning course[1]. A fuzzy
cognitive Map (FCM), a soft computing technique, is used for learner model in this research work. Rest of the
paper is divided into four sections. Second section describes related work done so far in this domain. Third
section explains the concept of proposed model. Fourth section is an experimental section which gives the
results and related discussion. Last section concludes the whole work and gives the future aspects of the paper
should explain the nature of the problem, previous work, purpose and the contribution of the paper. The
contents of each section may be provided in simple way to understand easily the facts discussed in the paper.
II. Related Works
Several studies have been carried out on automatic approach; some of them are worth mentioning in
the following literatures:
Graf, et al.in[1], an automatic approach for detecting learning style preferences according to the Felder-
Silverman learning style model (FSLSM), which can be used to find the FSLSM learning style based on
learning behavior of the students in LMS.
Bahiah and Mariam in[2], providing parameters for identification of FSLSM learning style dimension from
e-Learning activities;
Khan, et. al. in[3] an automatic identification for learning styles and affective states in web-based learning
management systems;
Dung and Florea in[4], an approach for detecting FSLSM learning styles in learning management systems
based on students behaviors.
Georgiou and Botsios applied FCM to learning style recognition[5]. They proposed a three-layer FCM
schema to allow experienced educators or cognitive psychology to tune up the system‟s parameters to
adjust the accuracy of the learning style recognition[6]. The inner layer is composed of the learning styles,
the middle one the learning activity factors, and the outer layer the 48 statements of the learning style
inventory.
2. Learner Model For Automatic Detection Of Learning Style Using FCM In Adaptive E-Learning…
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 19 | Page
2.1 The Felder-Silverman Learning Style Model
Research on the integration of learning styles in educational hypermedia began relatively recently and
only a few systems that attempted to adapt to learning styles have been developed[7]. Consequently, “it still is
unclear which aspects of learning styles are worth modeling and what can be done differently for users with
different learning styles”[8]. However, scientists agree that taking these student characteristics into account, one
can lead to an increased learning performance, greater enjoyment, enhanced motivation and reduced learning
time[7]. In order to make our literature based approach applicable for LMSs in general, only commonly used
learning activities and features in LMSs were selected for patterns analysis. These features include: content
objects, outlines, examples, self- assessment tests, exercises, and discussion forums. Furthermore, the
navigational behaviour of learner‟s in the course was also considered. In the next subsections, the bahaviours of
each learning style with respect to FSLSM are described in table 1 and the relevant patterns for identifying
learning styles for the given dimensions are presented, using the literature regarding FSLSM[9] as basis. It had
already proved that all engineering students are inductive so we eliminated the organization dimension from our
study and consider only Felder four learning style dimensions.
Table 1. Characteristics of each learning style with respect to FSLSM
Preferred Learning Style Dimension
Sensory-concrete material, more practical, std procedure Perception
Intuitive-abstract material, innovative, challenges
Visual-learning from picture Input
Verbal-learning from words
Inductive- It has proved that engg. students are Inductive Organization
Deductive
Active-Learning by doing, group work Processing
Reflective-learning by thinking work alone
Sequential-learn in linear steps, use partial knowledge Understanding
Global-learn in large leaps, need big picture
2.2 Mathematical Representation of Fuzzy Cognitive Maps
Fuzzy Cognitive Maps are fuzzy signed graphs with feedback (Stylios et al., 1997a). FCM consists of
nodes represented by concepts 𝐂𝐢 and interconnections strength 𝐞𝐢𝐣 between concept 𝐂𝐢 and concept𝐂𝐣. A Fuzzy
Cognitive Map forms a dynamic model. It is in fact a complex system consists of collection of concepts and
there are cause and effect relationship between them. A simple illustration of a Fuzzy Cognitive Map is depicted
in Figure1: as below, which consists of five nodes-concepts:
Interconnection‟s strength value eij among concepts is characterized by a weight wij . It is described as
the grade of causality between two concepts. Weights take fuzzy values in the interval [-1, 1]. The sign of the
weight indicates positive causality, then wij > 0 between concept Ci and concept Cj, i.e. an increase of the value
of concept Ci causes an increase in the value of concept Cj and similarly a decrease of the value of concept Ci
causes decrease in the value of conceptCj. When there is negative causality between two concepts, then wij < 0;
the increase in the first concept means the decrease in the value of the second concept and vice-versa[10].
Fig. 1. Simple FCM Structure
The value of each concept is calculated by applying the calculation rule of equation as given in
equation (1) where influence of one concept on another is also computed simultaneously:
𝑥i t = ƒ (𝑥j t − 1 wji
n
j=1
j≠1
(1)
3. Learner Model For Automatic Detection Of Learning Style Using FCM In Adaptive E-Learning…
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 20 | Page
Where 𝑥i t = the value of concept Ci at time t,
𝑥j t − 1 = the value of concept Cj at timet − 1,
wji is the weight of the interconnected concepts Cj and Ci and
f = sigmoid function where f =
1
1+e−λx
Other proposed squeezing functions are the tanh 𝑥 ,tanh 𝑥
2 and they convert the result of the
multiplication into the fuzzy interval [0,1] or [-1,1], where concepts can take any values in between.
At each time interval, values for all concepts of Fuzzy Cognitive Map change and process recalculation as per
equation (1). The calculation rule for each simulation step of FCM includes newly calculated values for all the
concepts. It consists of n 𝑥1 vector X which gathers the values of n concepts, and the matrix W = wij 1≤i,j≤n
which gathers the values of the causal edge weights for the Fuzzy Cognitive Map, where the dimension of the
matrices is equal to the number n of the distinct concepts used in the map. So the new state vector X of the FCM
at time t is calculated according to the equation:
X t = ƒ WT
X t − 1 (2)
2.3 Construction and Learning for FCM I
Experts who have knowledge and experience on the operation and behaviour of the system are
involved in the determination of concepts, interconnections and assigning casual fuzzy weights to the
interconnections (Kosko, 1992; Stylios and Groumpos, 1999). Generally, Fuzzy Cognitive Maps can be
understood using learning algorithms in a similar way as in the neural networks theory. Proposed learning
algorithms are categorized as the unsupervised learning algorithms.
During the training period of FCM, the weights of the map change with a first-order learning law based on the
correlation or differential Hebbian learning law:
W′
= −Wij + x′
i x′
j (3)
So x′i x′j > 0 if values of concepts Ci Cj move in the same direction and
x′i x′j < 0 if values of concepts Ci Cj move in opposite directions;
Therefore, concepts which tend to be positive or negative at the same time have strong positive weights, while
those that tend to be opposite have strong negative weights.
III. Proposed FCM Approach For Detecting Learning Style
The proposed model is literature based. Recorded data of learners‟ behaviors during their interactions with
learning objects and learning activities have been used and corresponding mapping rules infer learning styles
with respect to the Felder-Silverman Learning Style Model. So, basically we apply rule based fuzzy cognitive
map. The development of learner model takes an active and challenging part in next generation adaptive e-
learning environments[11],[12]. The purpose of learner models is to drive personalization based on learner and
learning characteristics that are considered as important for the learning process, such as cognitive, affective
and behavioural variables. Modeling learning styles with FCM that proposed in this paper aims to find a
mapping between students „actions in the system and the learning style that they best fit. To achieve this goal,
the inputs of the network are required to be identified and its outputs and the meaning of their possible values
are to be deciphered.
3.1 Labeling Learning object/ Relevant features of behavior pattern
Learning style of a learner is a way how a learner collects, processes and organizes information [12].
This paper is based on Felder-Silverman learning style model. According to FSLSM, each learner has a
preferred learning style measured in four dimensions (active/reflective, sensing/intuitive, visual/verbal,
sequential/global)[13],[5].The concept for providing adaptivity based on learning styles aims to individualized
each learner according to their needs and learning styles[4].The paper annotates each learning objects or
learning activity to each of the one learning style of among 16.Given table 2 shows the mapping of learning
activity or learning objects with learning style in processing dimension.
4. Learner Model For Automatic Detection Of Learning Style Using FCM In Adaptive E-Learning…
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 21 | Page
Table 2. Learning styles to learning object (activity) mapping for processing dimension
3.2 Collecting and processing information
Here, we measure measurable learning objects like theory, example, exercise, audio, video,
assignments etc. It is pertinent to mention that some input data and activity variables in terms of learning
objects cannot be mapped like touch, feel, taste, smell etc. The recorded learners‟ interactive data and their
preferences at perceiving and processing information could be considered as fuzzy sets and the relations among
them and learning styles can be considered as fuzzy relationships. In this way, the appropriateness of Fuzzy
cognitive maps for diagnosing user learner style is evident and very much relevant.
3.3 Input layer
When learners interact with the system all the interactive and activity data are automatically captured
and stored by the system in terms of log file. During interaction learner interact with different learning objects
/activitiesof set {L1, L2….Ln}.
The input data captured are on the basis of number of visits, time period and order of visiting the
learning material. These captured data produce a large number of sets having measurable patterns. Here, only
relevant data patterns are taken into consideration for analyzing learner‟s behavior for monitoring aspects.
These patterns are analyzed by learning style diagnostic module. So, learner model basically refers to learning
style diagnosis module. To represent the input of the network, it is proposed to use one processing unit (neuron)
in the input layer per observed action in the system. For example, time spent on learning objects or learning
activity, number of hits on learning objects or activity, types of learning materials and format, marks on self-
assessment, exam delivery time etc.
5. Learner Model For Automatic Detection Of Learning Style Using FCM In Adaptive E-Learning…
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 22 | Page
3.4 Output layer
The output of the network should approximate the learning style of the students based on the actions presented
at the input layer.
Fig. 2. Sugeno Fuzzy Inference System
IV. Automatic Detection Of Learner’s Learning Style In E-Learning
This work is the extended version of my paper already published in literature[12]. For simplicity, fuzzy
variables are taken in three degrees of linguistic variable (low medium & high) for measurement of learning
style. Six degrees of linguistic variables may also be taken into the proposed framework. Threshold membership
values for classification of linguistic variables may be taken as per literature[15][16].Range varies from [0 1]
positive term define one pole of each learning style as follow :
0.00 to 0-0.3 weak,
0.3 to 0.7-moderate,
0.7 to 1.0 -strong.
With help of applying FCM learning algorithm, learning styles are identified by incorporating fuzzy
rules. To explain these approaches the following related definitions are mapped to above sets.
the set of elements 𝑐𝑖∈Θ, where Θ={L};
A, a linguistic term of a linguistic variable (e.g. almost absolute cause);
A measurable numerical assignment compact interval Χ∈ (-∞, ∞);
V∈Χ, a linguistic variable which is a label for 𝑐𝑖∈Θ;
μA(𝑐𝑖 ) and the membership value of 𝑐𝑖 represent the degree of membership of θi to
elements of the sets determined by linguistic term A.
Fig. 3. Membership Function range from [-1 1]
The proposed fuzzy sets and their corresponding membership functions are:
• Mweak(weak) the fuzzy set for concept value around 0-30% (0-0.3) with membership function μw.
• Mmoderate (Moderate) the fuzzy set for concept value around 30-70% (0.3-0.7) with membership function
μm.
• Mhigh(high) the fuzzy set for concept value around 70-100% (0.7-1)with membership function μh.
V. Experiment And Result
6. Learner Model For Automatic Detection Of Learning Style Using FCM In Adaptive E-Learning…
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 23 | Page
Implementation of this approach basically uses multiple resources because not only one resource has
all features, which gives the best result. The authors had provided 4 week C++ course taking 80 learning objects
or activities in account among 60 students. Moodle is used in this work because it is one of the best open source
software for providing to create powerful, flexible and engaging online courses and experiences in learning
management system[2]. The data gathered by APIE LMS based on Moodle require less amount of work in data
pre-processing than data collected by other systems because it stored all the relevant and authenticate web
usages. The results of this model obtained through an experimental on MATLAB fuzzy inference system and it
was compared with those obtained through the Index of Learning Style questionnaire given by Felder-
Silverman. The comparison showed high precision values of proposed method in identifying learning styles.
Moreover, the method does not depend on a particular LMS. These characteristics indicate that the proposed
method is promising and capable for wide use.
5.1 Fuzzy Inference System
Sugeno fuzzy inference system is applied to implement the functions of this module Inference Stage:
if-than rule for approximation reasoning, for example- if the time spend to read text is short and if time spend to
view video is high and number of frequency to hit video lecture is high and the number of correct answer in SA
is high and if few attempts to find the correct answer have been made than the student learning rate is fast and
student is visual. Representative picture of inference model is given in fig.2.
After fuzzy inference, the calculated linguistic variables are defuzzified using Center of Area (CoA) in crisp
values. The crisp values are linked with the diagnosed learning styles in all four dimensions as per Felder Silver
learning Style Model.
Table 3: shows an example of membership values obtain in each dimension of a student. Most important
derivation is that higher value gives the degree of belongings and negative and positive sign give the learning
style.
Table 3. Membership value in each learning style of a learner
Dimension 1 Dimension 2 Dimension 3 Dimension 4
ACT REF SEN INT SEQ GLO VIS VER
0.77 0.1 0.2 0.35 0.8 0.2 0.75 0.3
Table 4. Classification of learning styles on the basis of threshold membership value.
Dimension 1 Dimension 2 Dimension 3 Dimension 4
ACT REF SEN INT SEQ GLO VIS VER
S W W M S W S W
Table 4: shows an example of learning style of a student in all four dimension i.e.Strong Act/Modeate
Int/Strong seq/Strong visual.
VI. Comparison of precision value of FCM with Felder Index of learning style (ILS)
After pattern analysis and using fuzzy rule based cognitive map technique, learning styles were
detected. The authors compared the predicted learning styles to the results obtained using the ILS questionnaire
using precision formula given by [17].
Precision =
Sim LSFCM ,LSILS
n
1
𝑛
………………………… )(Aeq
In this equation
Sim is 1 if the values obtained with the FCM and ILS are equal,
Sim 0 if they are opposite and
Sim 0.5 if one is neutral and the other an extreme value;
n is the number of students studied.
Experimentally, we obtain precision value in all dimensions
Precision: (71.25%, 76.12%, 75.25%, 77.35%) for Act/Ref, Sen/Int, Vis/Vrb, and Seq/Glo .
7. Learner Model For Automatic Detection Of Learning Style Using FCM In Adaptive E-Learning…
DOI: 10.9790/0661-1802041824 www.iosrjournals.org 24 | Page
Fig 4: Comparison of precision value of FCM with ILS
VII. Conclusion
This paper presents an approach to develop learner Model to detect learning style of students to
individualizing students according to their student‟s learning style. This system is a learner centric instead of
teacher centric which could increase the students‟ autonomy. In future, we are working on to obtain complete
learner‟s information‟s and provide personalized environment. The model recommends those required activities
and or resources that would favour and improve their learning process and integrate learning styles into
Adaptive e-learning system to assess the effect of adapting educational system.
REFERENCES
[1]. S. Graf, Kinshuk, and T. C. Liu, “Identifying learning styles in learning management systems by using indications from students‟
behaviour,” Proc. - 8th IEEE Int. Conf. Adv. Learn. Technol. ICALT 2008, pp. 482–486, 2008.
[2]. N. B. H. Ahmad and S. M. Shamsuddin, “A comparative analysis of mining techniques for automatic detection of student‟s
learning style,” 2010 10th Int. Conf. Intell. Syst. Des. Appl., pp. 877–882, 2010.
[3]. T. Gaikwad and M. A. Potey, “Personalized course retrieval using literature based method in e-learning system,” Proc. - 2013 IEEE
5th Int. Conf. Technol. Educ. T4E 2013, pp. 147–150, 2013.
[4]. P. Q. Dung and a M. Florea, “Adaptation to Learners‟ Learning Styles in a Multi-Agent E-Learning System,” Leveraging Technol.
Learn. Vol Ii, vol. 2, no. 1, pp. 259–266, 2012.
[5]. D. A. Georgiou, S. Botsios, V. Mitropoulou, M. Papaioannou, C. Schizas, and G. Tsoulouhas, “LEARNING STYLE STYLE
RECOGNITION RECOGNITION BASED BASED LEARNING ON ON THREE-LAYER ADJUSTABLE THREE-LAYER
FUZZY COGNITIVE MAP,” vol. 1, no. 4, pp. 333–347, 2011.
[6]. D. Georgiou, S. Botsios, G. Tsoulouhas, and A. Karakos, “Adjustable Learning Style Recognition based on 3Layers Fuzzy
Cognitive Map.”E. Popescu, “Diagnosing Students ‟ Learning Style in an Educational Hypermedia System,” no. 13. F. Azevedo
Dorca, L. Vieira Lima, M. Aparecida Fernandes, and C. Roberto Lopes, “Consistent evolution of student models by automatic
detection of learning styles,” IEEE Lat. Am. Trans., vol. 10, no. 5, pp. 2150–2161, 2012.
[7]. R. Felder and L. Silverman, “Learning and teaching styles in engineering education,” Eng. Educ., vol. 78, no. June, pp. 674–681,
1988.
[8]. C. Stylios and P. Groumpos, “Mathematical formulation of fuzzy cognitive maps,” Proc. 7th Mediterr. …, pp. 2251–2261, 1999.
[9]. J. E. Ã. Villaverde, D. Ã. Godoy, and A. Ã. Amandi, “Learning styles ‟ recognition in e-learning environments with feed-forward
neural networks,” pp. 197–206, 2006.
[10]. K. Almohammadi and H. Hagras, “An Interval Type-2 Fuzzy Logic Based System for Customised Knowledge Delivery within
Pervasive E-Learning Platforms,” 2013 IEEE Int. Conf. Syst. Man, Cybern., pp. 2872–2879, 2013.
[11]. H. M. Truong, “Integrating learning styles and adaptive e-learning system: Current developments, problems and opportunities,”
Comput. Human Behav., 2015.
[12]. S. Sweta and K. Lal, “Proceedings of the Fifth International Conference on Fuzzy and Neuro Computing (FANCCO - 2015),” V.
Ravi, K. B. Panigrahi, S. Das, and N. P. Suganthan, Eds. Cham: Springer International Publishing, 2015, pp. 353–363.
[13]. P. Q. Dung and A. M. Florea, “An approach for detecting learning styles in learning management systems based on learners ‟
behaviours,” 2012 Int. Conf. Educ. Manag. Innov., vol. 30, pp. 171–177, 2012.
[14]. J. Yang, Z. X. Huang, Y. X. Gao, and H. T. Liu, “Based on a Pattern Recognition Technique,” vol. 7, no. 2, pp. 165–177, 2014.
[15]. P. García, A. Amandi, S. Schiaffino, and M. Campo, “Evaluating Bayesian networks‟ precision for detecting students' learning
styles,” Comput. Educ., vol. 49, no. 3, pp. 794–808, 2007.