Computer Science & Engineering: An International Journal最新文献

筛选
英文 中文
Data Mining for Students’ Employability Prediction 通过数据挖掘预测学生的就业能力
Computer Science & Engineering: An International Journal Pub Date : 2024-02-28 DOI: 10.5121/cseij.2024.14101
S.M.M Malika
{"title":"Data Mining for Students’ Employability Prediction","authors":"S.M.M Malika","doi":"10.5121/cseij.2024.14101","DOIUrl":"https://doi.org/10.5121/cseij.2024.14101","url":null,"abstract":"This study has been undertaken to predict the student employability.Assessing student employability provides a method of integrating student abilities and employer business requirements, which is becoming an increasingly important concern for academic institutions. Improving student evaluation techniques for employability can help students to have a better understanding of business organizations and find the right one for them. The data for the training classification models is gathered through a survey in which students are asked to fill out a questionnaire in which they may indicate their abilities and academic achievement. This information may be used to determine their competency in a variety of skill categories, including soft skills, problem-solving skills and technical abilities and so on.The goal of this research is to use data mining to predict student employability by considering different factors such as skills that the students have gained during their diploma level and time duration with respect to the knowledge they have captured when they expect the placement at the end of graduation. Further during this research most specific skills with relevant to each job category also was identified. In this research for the prediction of the student employability different data mining models such as such as KNN, Naive Bayer’s, and Decision Tree were evaluated and out of that best model also was identified for this institute's student’s employability prediction.So, in this research classification and association techniques were used and evaluated.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"20 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140418269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft Computing: Contents, Techniques and Application 软计算:内容、技术与应用
Computer Science & Engineering: An International Journal Pub Date : 2023-06-27 DOI: 10.5121/cseij.2023.13301
Michael Gr. Voskoglou
{"title":"Soft Computing: Contents, Techniques and Application","authors":"Michael Gr. Voskoglou","doi":"10.5121/cseij.2023.13301","DOIUrl":"https://doi.org/10.5121/cseij.2023.13301","url":null,"abstract":"Soft Computing is a relatively new branch of Computer Science that deals with approximate reasoning. The techniques of Soft Computing are used successfully nowadays in many domestic, commercial and industrial applications becoming a major research object in automatic control engineering. The present paper reviews the contents of Soft Computing, which include probabilistic and in particular Bayesian reasoning, fuzzy logic, artificial neural networks and genetic algorithms. These topics are complementary to each other and can be used simultaneously for solving complex real-life problems, which cannot or it is too difficult be modelled mathematically. The paper also explores the main techniques used in Soft Computing and discusses their advantages with respect to the traditional techniques of hard computing.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Agent-Based Simulation for University Students Admission 基于agent的大学生录取仿真研究综述
Computer Science & Engineering: An International Journal Pub Date : 2023-04-29 DOI: 10.5121/cseij.2023.13202
Suha Khalil Assayed, P. Maheshwari
{"title":"A Review of Agent-Based Simulation for University Students Admission","authors":"Suha Khalil Assayed, P. Maheshwari","doi":"10.5121/cseij.2023.13202","DOIUrl":"https://doi.org/10.5121/cseij.2023.13202","url":null,"abstract":"Multiple factors influence college selection and admission behaviors. Most researchers focused on the academic and socioeconomic factors; the academic factors are high school GPA, SAT, admission tests, etc. On the other hand, the socioeconomic factors could be family income and first-generation students, which means parents did not complete their bachelor's degrees. However, some universities admission policies do not pay any attention to the race or to the minorities even though some of them might be from the lowincome students which could not afford any admission tests, and they might lose their chance to get admitted into their preferred universities. Therefore, most universities want a fairness admission system that include both the disadvantaged students along with other high-score achievement students. Thus, several simulations have been developed by using the agent-based models in order to simulate a real world system by considering other factors and domains that are varied in the complexities. This paper aimed to review several Agent-Based Models that are deployed by different admission offices from several international universities and colleges around the world, which is classified based on the main contribution of the simulations including the level of educational attainment as well as the universities selection behaviors.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Assessment of the “5 E’s” Instructional Treatment for Teaching Mathematics to Engineering Students 工科学生数学教学“5e”教学方式的模糊评价
Computer Science & Engineering: An International Journal Pub Date : 2023-04-29 DOI: 10.5121/cseij.2023.13201
M. Voskoglou
{"title":"Fuzzy Assessment of the “5 E’s” Instructional Treatment for Teaching Mathematics to Engineering Students","authors":"M. Voskoglou","doi":"10.5121/cseij.2023.13201","DOIUrl":"https://doi.org/10.5121/cseij.2023.13201","url":null,"abstract":"The “5 E’s” instructional treatment, which is based on the principles of social constructivism, is currently a very popular method for teaching, especially in school education. A hybrid model is developed in the present paper for assessing the effectiveness of the “5 E’s” application for teaching mathematics to engineering students of the University of Peloponnese, Greece. The model uses grey numbers and neutrosophic sets for evaluating the mean student performance, whereas the quality performance is assessed by calculating the Grade Point Average index.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"59 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cybersecurity and Digital Risk Assessment: A Family Case Study 网络安全和数字风险评估:一个家庭案例研究
Computer Science & Engineering: An International Journal Pub Date : 2023-04-29 DOI: 10.5121/cseij.2023.13204
Suha Khalil Assayed
{"title":"A Cybersecurity and Digital Risk Assessment: A Family Case Study","authors":"Suha Khalil Assayed","doi":"10.5121/cseij.2023.13204","DOIUrl":"https://doi.org/10.5121/cseij.2023.13204","url":null,"abstract":"Digitalization is not limited merely to business companies and high-tech industries; it has increasingly changed families' behaviors and attitudes as they are exposed to the digital world using different technological aspects. Therefore, numerous risks can be raised between all members of the family. For example, if IoT devices in a smart home are not embedded with high-security standards, they would be vulnerable to being attacked by hackers. Cyberattacks will not be limited to attacking virtually, but also they could unlock the home's door from the phone, and accordingly, the criminal will enter the home, and they can lose much more than credit cards. In this paper we identified various types of risks, with providing an analysis about the vulnerabilities and protecting families from digital attackers.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Device to Modular Robotized Instrument for Health Information 从无线装置到模块化机器人健康信息仪器
Computer Science & Engineering: An International Journal Pub Date : 2023-04-29 DOI: 10.5121/cseij.2023.13203
V. Ivanova, A. Boneva, Stoyan Ivanov, P. Vasilev
{"title":"A Wireless Device to Modular Robotized Instrument for Health Information","authors":"V. Ivanova, A. Boneva, Stoyan Ivanov, P. Vasilev","doi":"10.5121/cseij.2023.13203","DOIUrl":"https://doi.org/10.5121/cseij.2023.13203","url":null,"abstract":"This article is referred to an innovative wireless device for ECG patient monitoring during minimally invasive surgery. Our aim is to create new type of laparoscopy instruments to improve healthcare. The work presents a wireless device for ECG (DECG) as part of a robotic modular laparoscopic instrument (RMLI). Thus, the device allows ECG analysis and monitoring of the patient to be carried out complexly in combination with other diagnostic and therapeutic (RMLI) mode of operation activities. The proposed device provides detection and rapid warning of abnormal heart rate during surgery. Innovative uMAC wireless network stack is designed for module-control block communication. Control computer program processes and monitors (remotely or directly) received information from wireless device that is connected to patient. The software of the device is developed in Tcl/Tk scripting language for operation under Windows. A shared reality upgrade for Android has also been developed for it. The novelty of the solution is related to the construction and connection of the ECG with the used RMLI robotic module. In the future the designed instrument will can work autonomous. The team has worked in the field of minimally invasive and laparoscopic surgery roboticized instrumentation and the presented development is a continuation of this work.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124343033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AGENT-BASED SIMULATION FOR UNIVERSITY STUDENTS ADMISSION: MEDICAL COLLEGES IN JORDAN UNIVERSITIES 基于agent的大学生入学模拟:约旦大学医学院
Computer Science & Engineering: An International Journal Pub Date : 2023-02-27 DOI: 10.5121/cseij.2023.13101
Suha Khalil Assayed, P. Maheshwari
{"title":"AGENT-BASED SIMULATION FOR UNIVERSITY STUDENTS ADMISSION: MEDICAL COLLEGES IN JORDAN UNIVERSITIES","authors":"Suha Khalil Assayed, P. Maheshwari","doi":"10.5121/cseij.2023.13101","DOIUrl":"https://doi.org/10.5121/cseij.2023.13101","url":null,"abstract":"Medical colleges are considered one of the most competitive schools compared to other university departments. Most countries adopted the particular application process to ensure maximum fairness between students. For example, in UK students apply through the UCAS system, and most of USA universities use either Coalition App or Common App, on the other hand, some universities use their own websites. In fact, a Unified Admission Application process is adopted in Jordan for allocating the students to the public universities. However, the universities and colleges in Jordan are evaluating the applicants by using merely the centralized system without considering the socioeconomics factor, as the high school GPA is the essential player their selection mechanism. In this paper, the authors will use an Agent Based model (ABM) to simulate different scenarios by using Netlogo software (v. 6.3). The authors used different parameters such as the family-income and the high school GPA in order to maximize the utilities of the fairness and equalities of universities admission. The model is simulated into different scenarios. For instance, students with low family income and high GPA given them the priority in studying medicine comparing with same high school GPA and higher family-income, as a results, after several rotations of the simulation the reputation of medical schools are identified based on students’ preferences and seats’ allocated as it shows that high ranking universities are mainly allocated with have high cut-off GPA score.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Detection Availing Feature Discretion using Random Forest Classifier 基于随机森林分类器特征自由裁量的攻击检测
Computer Science & Engineering: An International Journal Pub Date : 2022-12-30 DOI: 10.5121/cseij.2022.12611
Anne Dickson, Ciza Thomas
{"title":"Attack Detection Availing Feature Discretion using Random Forest Classifier","authors":"Anne Dickson, Ciza Thomas","doi":"10.5121/cseij.2022.12611","DOIUrl":"https://doi.org/10.5121/cseij.2022.12611","url":null,"abstract":"The widespread use of the Internet has an adverse effect of being vulnerable to cyber attacks. Defensive mechanisms like firewalls and IDSs have evolved with a lot of research contributions happening in these areas. Machine learning techniques have been successfully used in these defense mechanisms especially IDSs. Although they are effective to some extent in identifying new patterns and variants of existing malicious patterns, many attacks are still left as undetected. The objective is to develop an algorithm for detecting malicious domains based on passive traffic measurements. In this paper, an anomaly-based intrusion detection system based on an ensemble based machine learning classifier called Random Forest with gradient boosting is deployed. NSL-KDD cup dataset is used for analysis and out of 41 features, 32 features were identified as significant using feature discretion. Our observations confirm the conjecture that both the feature selection and stochastic based genetic operators improves the accuracy and the effectiveness. The training time is shown to be reduced tremendously by 98.59% and accuracy improved to 98.75%.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workflow Scheduling in Cloud Computing Environment by Combining Particle Swarm Optimization and Grey Wolf Optimization 结合粒子群优化和灰狼优化的云计算环境下工作流调度
Computer Science & Engineering: An International Journal Pub Date : 2022-12-30 DOI: 10.5121/cseij.2022.12601
Divya Makhija, P. B. Reddy, Ch. Sudhakar, V. Kumari
{"title":"Workflow Scheduling in Cloud Computing Environment by Combining Particle Swarm Optimization and Grey Wolf Optimization","authors":"Divya Makhija, P. B. Reddy, Ch. Sudhakar, V. Kumari","doi":"10.5121/cseij.2022.12601","DOIUrl":"https://doi.org/10.5121/cseij.2022.12601","url":null,"abstract":"Scheduling workflows is a vital challenge in cloud computing due to its NP-complete nature and if an efficient workflow task scheduling algorithm is not used then it affects the system’s overall performance. Therefore, there is a need for an efficient workflow task scheduling algorithm that can distribute dependent tasks to virtual machines efficiently. In this paper, a hybrid workflow task scheduling algorithm based on a combination of Particle Swarm Optimization and Grey Wolf Optimization (PSO GWO) algorithms, is proposed. PSO GWO overcomes the disadvantages of both PSO and GWO algorithms by improving the exploitation (local search) of PSO algorithm and exploration (global search) of GWO algorithm. This leads to better balance between exploration and exploitation, consequently it minimizes the makespan with 5.52% compared to GWO and 3.68% compared to PSO. The degree of imbalance reduced upto 33.22% compared to GWO and 17.61% compared to PSO, improves the convergence rate as well depending on number tasks and iterations. CloudSim tool is used to evaluate the proposed algorithm. The simulation results confirmed that the proposed method performs better than both of the standard PSO and GWO in terms of makespan, degree of imbalance and convergence rate","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115713049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise Removal in Traffic Sign Detection Systems 交通标志侦测系统的噪音去除
Computer Science & Engineering: An International Journal Pub Date : 2022-12-30 DOI: 10.5121/cseij.2022.12608
Mohan Kumar G, M. Shriram, Rajeswari Sridhar
{"title":"Noise Removal in Traffic Sign Detection Systems","authors":"Mohan Kumar G, M. Shriram, Rajeswari Sridhar","doi":"10.5121/cseij.2022.12608","DOIUrl":"https://doi.org/10.5121/cseij.2022.12608","url":null,"abstract":"The application of Traffic sign detection and recognition is growing in traffic assistant driving systems and automatic driving systems. It helps drivers and automatic driving systems to detect and recognize the traffic signs effectively. However, it is found that it may be difficult for these systems to work in challenging environments like rain, haze, hue, etc. To help the detection systems to have better performance in challenging conditions like rain and haze, we propose the use of a deep learning technique based on a Convolutional Neural Network to process visual data. The processed data could be used in the detection. We are using the NoiseNet model [11], a noise reduction network for our architecture. The model is trained to enhance images in patches instead of as a whole. The training is done using the Challenging Unreal and Real Environment - Traffic Sign Detection Dataset(CURE-TSD) which contains videos of different roads in various challenging situations. The enhanced images obtained are compared using the object detection algorithms YOLO and Faster RCNN. The Mean Absolute Error(MAE) of original and enhanced images are calculated and compared for two classes of images - rain and haze for both the algorithms. The proposed approach achieved an average Peak Signal to Noise Ration(PSNR) of 25.30 and an Structural Similarity(SSIM) of 0.88. The average MAE values of YOLO and Faster RCNN model reduced by 0.11 and 0.30 respectively on using enhanced images.","PeriodicalId":361871,"journal":{"name":"Computer Science & Engineering: An International Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114524423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信