International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(11), С. 141 - 154
Опубликована: Июнь 7, 2023
Security
and
safety
are
critical
concerns
in
Vehicular
Adhoc
Networks.
vulnerable
to
Distributed
Denial
of
Service
(DDoS)
attacks,
which
occur
when
multiple
vehicles
carry
out
various
tasks.
This
cause
disrupts
the
normal
functioning
legitimate
routes.
In
this
work,
Hybrid
PSO-BAT
Optimization
Algorithm
(HBPSO)
based
on
modified
chaos
-cellular
neural
network
(Chaos
-
CNN)
approaches
has
been
proposed
overcome
DDoS
attacks.
The
suggest
consists
three-part
hybrid
optimization
search
algorithm
enhance
route
from
source
destination,
theory
module
is
used
detect
abnormal
nodes,
then
Modified
Chaotic
CNN
(MCCN)
employed
prevent
a
malicious
node
sending
data
destination
by
determining
that
consumer
more
resource,
packets
lose
or
victim
could
reset
path
between
attacker
itself.
CICIDS
dataset
test
evaluate
performance
approach
criteria
accuracy,
packet
loss,
jitter.
Chaos
approached
results
outperform
similar
models
related
work
protects
VANETs
with
high
accuracy
0.8736,
specificity
0.9959,
TPR
0.9561,
FPR
0.78,
Detection
rate
0.9561.
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2023,
Номер
11(4), С. 105 - 105
Опубликована: Авг. 30, 2023
This
study
investigates
the
moral
dilemmas
that
arise
with
incorporating
Chat
GPT
into
higher
education,
a
focus
on
situation
in
Latinoamerican
institutions
of
learning.
The
surveyed
220
people
via
online
questionnaire
to
learn
more
about
their
experiences
and
motivations
for
using
AI-powered
conversational
agents.
An
overview
demographics
participants
was
provided
through
descriptive
statistics.
investigation
subject
at
hand
lays
groundwork
further
research.
It
also
reveals
hidden
meanings
observed
phenomena,
it
suggests
possible
solutions
problems
have
been
uncovered.
research
looks
how
AI
systems
chatbots
can
supplement
human
knowledge
judgment,
as
well
potential
drawbacks.
results
showed
thought
integration
moderately
accessible
had
positive
social
attitudes.
They
understood
value
responsibility
creating
individualized
educational
opportunities.
Participants
stressed
necessity
explicit
institutional
standards
regarding
privacy
data
security.
Gender,
age,
sense
accessibility,
attitude,
opinions,
personal
experience,
security,
guidelines,
learning
were
found
affect
participants'
reliance
regression
analysis.
findings
shed
light
education
is
complicated
by
factors
such
individual
beliefs,
cultural
norms,
ethical
problems.
busy
schedules
students
may
be
accommodated
resources
they
need
succeed
made
available
thanks
this
adaptability.
In
addition,
natural
language
processing
models
offer
instantaneous
help
text
chat,
voice,
or
video.
To
fully
grasp
consequences
lead
creation
responsible
implementation
techniques,
proposes
additional
qualitative
investigations,
longitudinal
studies,
comparative
across
diverse
contexts
required.
Closing
these
gaps
will
move
field
forward
ways
are
beneficial
classroom.
Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications,
Год журнала:
2024,
Номер
15(1), С. 231 - 243
Опубликована: Март 29, 2024
Recently,
the
education
sector
has
undergone
a
notable
change
due
to
incorporation
of
technology,
resulting
in
emergence
Educational
Technology
(EdTech).
This
new
trend
completely
transformed
learning
process
for
students,
teaching
methods
educators,
and
operations
educational
institutions.
Due
EdTech,
become
simpler
access,
engaging,
efficient,
providing
customized
diverse
experiences.
article
explores
into
significant
influence
EdTech
on
field
promising
opportunities
it
offers
future.
enabler,
allowing
institutions
meet
evolving
student
needs
cultivate
skillsets
without
being
limited
by
geographical
barriers.
integrates
digital
technological
media
with
conventional
instruction
enable
various
forms
learning,
offering
adaptability,
enhancing
engagement,
high-quality
solutions.
tools
empower
educators
track
encourage
interactive
creative
experiences,
stand
human-centred
focusing
critical
thinking,
innovation,
entrepreneurial
activity.
Exploring
deeper
relationships
between
data
as
well
predicting
how
students
do
school
been
made
possible
through
mining.
Presented
is
novel
model
utilizing
machine
computational
forecast
using
their
midterm
exam
results.
Various
algorithms
were
assessed
improving
performance
final
exam.
study
comprehensively
examines
different
technologies
recommend
unified
that
could
serve
solid
framework
classroom
teaching.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(06), С. 4 - 17
Опубликована: Май 16, 2023
In
cloud
computing,
resources
are
used
to
communicate
instead
of
local
servers
or
individual
devices.
However,
sharing
among
several
users
is
a
difficult
issue
in
communication.
Cryptography
and
steganography
techniques
for
storage
address
data
security
challenges.
This
paper
presents
novel
method
securely
encrypting
image
transmission
link
exchange
with
service.
There
two
phases
accomplish
the
encryption
process,
first
phase
encrypts
file
by
XORing
it
random
key
that
generated
new
hybrid
chaotic
map.
The
second
converts
encrypted
format
audio
add
another
layer
improve
secure
transfer.
using
map
has
benefit
having
more
than
10256
spaces
necessary
level
security.
Based
on
statistical
analysis
encryption,
quality
evaluated
criteria,
results
demonstrate
algorithm's
ability
resist
Scientific Reports,
Год журнала:
2024,
Номер
14(1)
Опубликована: Авг. 1, 2024
This
study
explores
the
influence
of
Internet
Things
(IoT)
and
Artificial
Intelligence
(AI)-enhanced
learning
models
on
student
management
in
educational
informatization
management.
A
game-theoretic
enhanced
model
is
proposed
to
achieve
this
objective,
incorporating
resource
scheduling
strategies
under
fog
computing
a
system
that
integrates
IoT
AI
technologies.
model's
performance
are
then
tested.
The
results
indicate
computing-based
hierarchical
Q-learning
(Q)
achieves
faster
convergence
than
single
Q
model,
reaching
after
80
training
rounds,
ten
rounds
earlier
comparative
algorithm.
exhibits
lower
average
workload
delay
0.5
ms
node
below
1
ms,
showcasing
significant
advantages
terms
overall
cost-effectiveness,
thus
minimizing
service
costs.
has
3000
concurrent
user
connections,
static
page
request
times
ranging
from
0
25
s,
login
response
time
predominantly
at
60
capacity
process
up
20
parallel
tasks
per
second
with
zero
errors.
functionalities
fully
realized,
meeting
usage
demands
effectively
achieving
highest
functional
score
9.03
for
online
interaction
functionality.
demonstrates
efficacy
environment
positive
impact
technologies
better
caters
individual
needs,
enhancing
outcomes
experiences.
study's
innovation
lies
integration
technology
AI-enhanced
models,
coupled
introduction
strategies,
enabling
intelligently
identify
requirements,
allocate
resources,
dynamically
optimize
process,
ultimately
improving
outcomes.
holds
implications
education
quality
promoting
personalized
development.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(07), С. 167 - 178
Опубликована: Апрель 5, 2023
The
highest
way
to
protect
data
from
intruder
and
unauthorized
persons
has
become
a
major
issue.
This
matter
led
the
development
of
many
techniques
for
security,
such
as
Steganography,
Cryptography,
Watermarking
disguise
data.
paper
proposes
an
image
steganography
method
using
Least
Significant
Bits
(LSB)
technique
XOR
operator
secret
key,
through
which
key
is
transformed
into
one-dimensional
bit
stream
array,
then
these
bits
are
XORed
with
image.
Multiple
experiments
have
been
performed
embed
color
grayscale
images
inside
cover
media.
In
this
work,
LSB
ideal
in
two
ways:
firstly,
only
least
significant
one-bit
(1bit)
each
byte
will
store
embedded
data,
named
(1-LSB).
Secondly,
four
right
half-byte
(4
bits)
(4-LSB).
Subjective
objective
analyzes
were
process.
subjective
analysis
responsible
both
HVS
histogram,
whereas
involved
PSNR
MSE
metrics.
International Journal of Applied Engineering and Management Letters,
Год журнала:
2023,
Номер
unknown, С. 1 - 94
Опубликована: Окт. 25, 2023
Purpose:
Businesses
in
all
sectors,
including
the
secondary
industry,
will
turn
to
tech-business
analytics
as
a
crucial
tool.
Tech-Business
Analytics'
role
industrial
sector
is
support
companies
making
data-driven
decisions
that
optimize
their
operations,
boost
productivity,
and
profitability.
may
supply
chains
by
accessing
data
on
suppliers,
inventories,
logistics,
other
aspects
spot
inefficiencies
areas
for
improvement.
Organizations
can
use
this
information
reduce
downtime
production
schedule
maintenance
advance
predict
when
machinery
equipment
likely
break.
Examining
product
flaws,
customer
complaints,
help
firms
improve
quality
control
systems
identifying
root
causes
implementing
corrective
measures.
Studying
consumer
behaviour,
industry
trends,
factors
organizations
sales
marketing
activities
find
chances
expansion
higher
Design/Methodology/Approach:
several
processes
methodology
them
make
based
sector.
This
entail
enhancing
effectiveness
of
chain
or
decreasing
downtime.
After
issue,
necessary
must
be
gathered
prepared.
Once
collected,
it
analyzed
using
statistical
models
analytical
methods.
collected
might
looking
relationships
between
multiple
variables,
spotting
trends
predicting
outcomes
predictive
models.
Findings/Result:
It
described
article
how
have
managed
growth
itself
from
its
inception
present.
The
Analytics
technique
offers
structured
approach
problem-solving
analysis
assist
better
decision-making
business
outcomes.
Originality/Value:
Exploring
evolutionary
path
transforms
into
advanced
realm
technology-driven
within
A
generic
architecture
also
examines
130
recently
published
Tech
Business
Secondary
Industry
research
projects
technical
purposes.
new
field
applies
ICCT-underpinning
technologies
(TBA).
TBA
intended
provide
businesses
with
unprecedented
opportunities
innovation
sectors.
Paper
Type:
Exploratory
research.
International Journal of Emerging Technologies in Learning (iJET),
Год журнала:
2023,
Номер
18(06), С. 42 - 52
Опубликована: Март 21, 2023
—
To
identify
the
effect
of
deep
learning
strategy
on
mathematics
achievement
and
practical
intelligence
among
secondary
school
students
during
2022/2023
academic
year.
In
research,
experimental
research
method
with
two
groups
(experimental
control)
a
post-test
were
adopted.
The
community
is
represented
by
female
fifth
scientific
grade
from
first
Karkh
Education
Directorate.
(61)
intentionally
chosen,
they
divided
into
groups:
an
group
(30)
who
taught
according
to
proposed
strategy,
control
(31)
usual
method.
For
purpose
collecting
data
for
experiment,
test
was
built,
which
in
its
final
form
(25)
items
out
(20)
objective
type
both
them.
Based
findings,
studied
strategies
outperformed
those
traditional.
International Journal of Engineering Pedagogy (iJEP),
Год журнала:
2024,
Номер
14(1), С. 112 - 128
Опубликована: Янв. 30, 2024
The
need
to
constantly
and
consistently
improve
the
quality
quantity
of
educational
system
is
essential.
E-learning
has
emerged
from
rapid
cycle
change
expansion
new
technologies.
Advances
in
information
technology
have
increased
network
bandwidth,
data
access
speed,
reduced
storage
costs.
In
recent
years,
implementation
cloud
computing
settings
garnered
interest
major
companies,
leading
substantial
investments
this
area.
Cloud
improves
engineering
education
by
providing
an
environment
that
can
be
accessed
anywhere
allowing
resources
on
demand.
a
term
used
describe
provision
hosting
services
Internet.
It
predicted
next
generation
architecture
offers
great
potential
enhance
productivity
reduce
service
providers
offer
their
processing
memory
users.
By
paying
for
use
these
resources,
users
them
calculations
anytime
anywhere.
provides
ability
increase
productivity,
save
power,
converting
power
into
tool
with
constant
capabilities.
supports
remote
its
own
set
characteristics
requires
unique
strategy.
Students
wide
variety
instructional
materials
at
any
time
location,
thanks
computing.
Additionally,
they
share
other
community
members.
e-learning
several
advantages,
such
as
unlimited
high
scalability,
costs
associated
e-learning.
An
improvement
teaching
learning
achieved
through
flexible
computing,
which
educators
students.
light
this,
current
research
presents
suitable
superior
option
systems.