Abstract: The necessity of solving multi dimensional
complicated scientific problems beside the necessity of several
objective functions optimization are the most motive reason of born
of artificial intelligence and heuristic methods.
In this paper, we introduce a new method for multiobjective
optimization based on learning automata. In the proposed method,
search space divides into separate hyper-cubes and each cube is
considered as an action. After gathering of all objective functions
with separate weights, the cumulative function is considered as the
fitness function. By the application of all the cubes to the cumulative
function, we calculate the amount of amplification of each action and
the algorithm continues its way to find the best solutions. In this
Method, a lateral memory is used to gather the significant points of
each iteration of the algorithm. Finally, by considering the
domination factor, pareto front is estimated. Results of several
experiments show the effectiveness of this method in comparison
with genetic algorithm based method.
Abstract: Collaborative working environments for distance
education can be considered as a more generic form of contemporary
remote labs. At present, the majority of existing real laboratories are
not constructed to allow the involved participants to collaborate in
real time. To make this revolutionary learning environment possible
we must allow the different users to carry out an experiment
simultaneously. In recent times, multi-user environments are
successfully applied in many applications such as air traffic control
systems, team-oriented military systems, chat-text tools, multi-player
games etc. Thus, understanding the ideas and techniques behind these
systems could be of great importance in the contribution of ideas to
our e-learning environment for collaborative working. In this
investigation, collaborative working environments from theoretical
and practical perspectives are considered in order to build an
effective collaborative real laboratory, which allows two students or
more to conduct remote experiments at the same time as a team. In
order to achieve this goal, we have implemented distributed system
architecture, enabling students to obtain an automated help by either
a human tutor or a rule-based e-tutor.
Abstract: The emergence of blended learning has been
influenced by the rapid changes in Higher Education within the last
few years. However, there is a lack of studies that look into the future
of blended learning in the Saudi context. The most likely explanation
is that blended learning is relatively new and, with respect to learning
in general, under-researched. This study addresses this gap and
explores the views of lecturers and students towards the future of
blended learning in Saudi Arabia. This study was informed by the
interpretive paradigm that appears to be most appropriate to
understand and interpret the perceptions of students and instructors
towards a new learning environment. While globally there has been
considerable research on the perceptions of e-learning and blended
learning with its different models, there is plenty of space for further
research specifically in the Arab region, and in Saudi Arabia where
blended learning is now being introduced.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: As the enormous amount of on-line text grows on the
World-Wide Web, the development of methods for automatically
summarizing this text becomes more important. The primary goal of
this research is to create an efficient tool that is able to summarize
large documents automatically. We propose an Evolving
connectionist System that is adaptive, incremental learning and
knowledge representation system that evolves its structure and
functionality. In this paper, we propose a novel approach for Part of
Speech disambiguation using a recurrent neural network, a paradigm
capable of dealing with sequential data. We observed that
connectionist approach to text summarization has a natural way of
learning grammatical structures through experience. Experimental
results show that our approach achieves acceptable performance.
Abstract: This paper outlines the development of a learning retrieval agent. Task of this agent is to extract knowledge of the Active Semantic Network in respect to user-requests. Based on a reinforcement learning approach, the agent learns to interpret the user-s intention. Especially, the learning algorithm focuses on the retrieval of complex long distant relations. Increasing its learnt knowledge with every request-result-evaluation sequence, the agent enhances his capability in finding the intended information.
Abstract: In this paper, backup and recovery technique for Peer
to Peer applications, such as a distributed asynchronous Web-Based
Training system that we have previously proposed. In order to
improve the scalability and robustness of this system, all contents and
function are realized on mobile agents. These agents are distributed
to computers, and they can obtain using a Peer to Peer network
that modified Content-Addressable Network. In the proposed system,
although entire services do not become impossible even if some
computers break down, the problem that contents disappear occurs
with an agent-s disappearance. As a solution for this issue, backups
of agents are distributed to computers. If a failure of a computer is
detected, other computers will continue service using backups of the
agents belonged to the computer.
Abstract: Currently electronic slide (e-slide) is one of the most common styles in educational presentation. Unfortunately, the utilization of e-slide for the visually impaired is uncommon since they are unable to see the content of such e-slides which are usually composed of text, images and animation. This paper proposes a model for presenting e-slide in multimodal presentation i.e. using conventional slide concurrent with voicing, in both languages Malay and English. At the design level, live multimedia presentation concept is used, while at the implementation level several components are used. The text content of each slide is extracted using COM component, Microsoft Speech API for voicing the text in English language and the text in Malay language is voiced using dictionary approach. To support the accessibility, an auditory user interface is provided as an additional feature. A prototype of such model named as VSlide has been developed and introduced.
Abstract: School physical education, through its objectives and
contents, efficiently valorizes the pupils- abilities, developing them,
especially the coordinative skill component, which is the basis of
movement learning, of the development of the daily motility and also
of the special, refined motility required by the practice of certain
sports. Medium school age offers the nervous and motor substratum
needed for the acquisition of complex motor habits, a substratum that
is essential for the coordinative skill. Individuals differ as to the level
at which this function is performed, the extent to which this function
turns an individual into a person that is adapted and adaptable to
complex and various situations. Spatio-temporal orientation, together
with movement combination and coupling, and with kinesthetic,
balance, motor reaction, movement transformation and rhythm
differentiation form the coordinative skills. From our viewpoint,
these are characteristic features with high levels of manifestation in a
complex psychomotor act - valorizing the quality of one-s talent - as
well as indices pertaining to one-s psychomotor intelligence and
creativity.
Abstract: The purpose of this paper is to describe the process of
setting up a learning community within an elementary school in
Ontario, Canada. The description is provided through reflection and
examination of field notes taken during the yearlong training and
implementation process. Specifically the impact of teachers- capacity
on the creation of a learning community was of interest. This paper is
intended to inform and add to the debate around the tensions that
exist in implementing a bottom-up professional development model
like the learning community in a top-down organizational structure.
My reflections of the process illustrate that implementation of the
learning community professional development model may be
difficult and yet transformative in the professional lives of the
teachers, students, and administration involved in the change process.
I conclude by suggesting the need for a new model of professional
development that requires a transformative shift in power dynamics
and a shift in the view of what constitutes effective professional
learning.
Abstract: The amount of the information being churned out by the field of biology has jumped manifold and now requires the extensive use of computer techniques for the management of this information. The predominance of biological information such as protein sequence similarity in the biological information sea is key information for detecting protein evolutionary relationship. Protein sequence similarity typically implies homology, which in turn may imply structural and functional similarities. In this work, we propose, a learning method for detecting remote protein homology. The proposed method uses a transformation that converts protein sequence into fixed-dimensional representative feature vectors. Each feature vector records the sensitivity of a protein sequence to a set of amino acids substrings generated from the protein sequences of interest. These features are then used in conjunction with support vector machines for the detection of the protein remote homology. The proposed method is tested and evaluated on two different benchmark protein datasets and it-s able to deliver improvements over most of the existing homology detection methods.
Abstract: Information and communication technology (ICT) is
essential to the operation of business, and create many employment
opportunities. High volumes of students graduate in ICT however
students struggle to find job placement. A discrepancy exists between
graduate skills and industry skill requirements. To address the need
for ICT skills required, universities must create programs to meet the
demands of a changing ICT industry. This requires a partnership
between industry, universities and other stakeholders. This situation
may be viewed as a critical systems thinking problem situation as
there are various role players each with their own needs and
requirements. Jackson states a typical critical systems methods has a
pluralistic nature. This paper explores the applicability and suitability
of Maslow and Dooyeweerd to guide understanding and make
recommendations for change in ICT WIL, to foster an all-inclusive
understanding of the situation by stakeholders. The above methods
provide tools for understanding softer issues beyond the skills
required. The study findings suggest that besides skills requirements,
a deeper understanding and empowering students from being a
student to a professional need to be understood and addressed.
Abstract: This paper presents a recognition system for isolated
words like robot commands. It’s carried out by Time Delay Neural
Networks; TDNN. To teleoperate a robot for specific tasks as turn,
close, etc… In industrial environment and taking into account the
noise coming from the machine. The choice of TDNN is based on its
generalization in terms of accuracy, in more it acts as a filter that
allows the passage of certain desirable frequency characteristics of
speech; the goal is to determine the parameters of this filter for
making an adaptable system to the variability of speech signal and to
noise especially, for this the back propagation technique was used in
learning phase. The approach was applied on commands pronounced
in two languages separately: The French and Arabic. The results for
two test bases of 300 spoken words for each one are 87%, 97.6% in
neutral environment and 77.67%, 92.67% when the white Gaussian
noisy was added with a SNR of 35 dB.
Abstract: Knowledge is indispensable but voluminous knowledge becomes a bottleneck for efficient processing. A great challenge for data mining activity is the generation of large number of potential rules as a result of mining process. In fact sometimes result size is comparable to the original data. Traditional data mining pruning activities such as support do not sufficiently reduce the huge rule space. Moreover, many practical applications are characterized by continual change of data and knowledge, thereby making knowledge voluminous with each change. The most predominant representation of the discovered knowledge is the standard Production Rules (PRs) in the form If P Then D. Michalski & Winston proposed Censored Production Rules (CPRs), as an extension of production rules, that exhibit variable precision and supports an efficient mechanism for handling exceptions. A CPR is an augmented production rule of the form: If P Then D Unless C, where C (Censor) is an exception to the rule. Such rules are employed in situations in which the conditional statement 'If P Then D' holds frequently and the assertion C holds rarely. By using a rule of this type we are free to ignore the exception conditions, when the resources needed to establish its presence, are tight or there is simply no information available as to whether it holds or not. Thus the 'If P Then D' part of the CPR expresses important information while the Unless C part acts only as a switch changes the polarity of D to ~D. In this paper a scheme based on Dempster-Shafer Theory (DST) interpretation of a CPR is suggested for discovering CPRs from the discovered flat PRs. The discovery of CPRs from flat rules would result in considerable reduction of the already discovered rules. The proposed scheme incrementally incorporates new knowledge and also reduces the size of knowledge base considerably with each episode. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested cumulative learning scheme would be useful in mining data streams.
Abstract: Evolutionary robotics is concerned with the design of
intelligent systems with life-like properties by means of simulated
evolution. Approaches in evolutionary robotics can be categorized
according to the control structures that represent the behavior and the
parameters of the controller that undergo adaptation. The basic idea
is to automatically synthesize behaviors that enable the robot to
perform useful tasks in complex environments. The evolutionary
algorithm searches through the space of parameterized controllers
that map sensory perceptions to control actions, thus realizing a
specific robotic behavior. Further, the evolutionary algorithm
maintains and improves a population of candidate behaviors by
means of selection, recombination and mutation. A fitness function
evaluates the performance of the resulting behavior according to the
robot-s task or mission. In this paper, the focus is in the use of
genetic algorithms to solve a multi-objective optimization problem
representing robot behaviors; in particular, the A-Compander Law is
employed in selecting the weight of each objective during the
optimization process. Results using an adaptive fitness function show
that this approach can efficiently react to complex tasks under
variable environments.
Abstract: The report focuses on such an important indicator of the nature and direction of development of ethnic and cultural processes in the Republic of Kazakhstan, as ethno linguistic situation. It is shown that, in essence, on the one hand, expresses the degree of the actual propagation and the level of use of the languages of the various ethnic communities. On the other hand, reflects the important patterns, trends and prospects of ethno-cultural and ethnodemographic processes in the Republic. It is important to note that the ethno linguistic situation in different regions of Kazakhstan, due to its more dynamic and much more difficult to demonstrate a much greater variety of options when compared with the ethnic situation in the country. For the two major ethnic groups of the republic – Kazakh and Russian language ethno differentiating retains its value, while for the other ethnic groups observed decline in the importance of this indicator. As you know, the language of international communication in the country is Russian. As the censuses of population, the Russian language in many areas of Northern, Central and Eastern Kazakhstan becomes a means of ethno linguistic development for most of the non-Russian population. This is most clearly illustrated by the Germans, and the Slavic ethnic groups. In this case, the Russian language is not just a means of international communication for a number of ethnic groups, and ethnic groups, it becomes a factor of ethnic self-expression. The value of the Kazakh language as their mother tongue for the other groups of the population is small. More clearly it can be traced only to the Turkic-speaking population of the republic – Uzbeks, Uighurs, Tatars, Turks, etc. The state Kazakh language is a means of international communication in the Western and Southern Kazakhstan, with a predominance of the Kazakh population. The report shows that the most important factor in the development of ethno-linguistic and ethno-cultural processes is bilingualism. Comparative analysis of materials census shows, first, on the increase of the proportion of bilingual population among Kazakhs and Russian, and second, to reduce the proportion of bilingual population of other ethnic groups living in Kazakhstan, and third, a higher proportion bilingual population among residents than rural residents, regardless of their ethnicity. Bilingualism is mainly of a "national Kazakh", "national Russian" or "Kazakh-national" or "Russian-national" character. The President N.A. Nazarbayev said that the Kazakh language is the most important factor in the consolidation of the people of Kazakhstan. He therefore called on government and other state and local representative bodies fully develop the state language, to create all the necessary organizational, material and technical conditions for free and open learning the state language by all citizens of the Republic of Kazakhstan.
Abstract: In this paper, we present a new learning algorithm for
anomaly based network intrusion detection using improved self
adaptive naïve Bayesian tree (NBTree), which induces a hybrid of
decision tree and naïve Bayesian classifier. The proposed approach
scales up the balance detections for different attack types and keeps
the false positives at acceptable level in intrusion detection. In
complex and dynamic large intrusion detection dataset, the detection
accuracy of naïve Bayesian classifier does not scale up as well as
decision tree. It has been successfully tested in other problem
domains that naïve Bayesian tree improves the classification rates in
large dataset. In naïve Bayesian tree nodes contain and split as
regular decision-trees, but the leaves contain naïve Bayesian
classifiers. The experimental results on KDD99 benchmark network
intrusion detection dataset demonstrate that this new approach scales
up the detection rates for different attack types and reduces false
positives in network intrusion detection.
Abstract: In this paper an open agent-based modular framework
for personalized and adaptive curriculum generation in e-learning
environment is proposed. Agent-based approaches offer several
potential advantages over alternative approaches. Agent-based
systems exhibit high levels of flexibility and robustness in dynamic
or unpredictable environments by virtue of their intrinsic autonomy.
The presented framework enables integration of different types of
expert agents, various kinds of learning objects and user modeling
techniques. It creates possibilities for adaptive e-learning process.
The KM e-learning system is in a process of implementation in
Varna Free University and will be used for supporting the
educational process at the University.
Abstract: Successful intelligence (SI) is the integrated set of the
ability needed to attain success in life, within individual-s sociocultural
context. People are successfully intelligent by recognizing
their strengths and weaknesses. They will find ways to strengthen
their weakness and maintain their strength or even improve it. SI
people can shape, select, and adapt to the environments by using
balance of higher-ordered thinking abilities including; critical,
creative, and applicative. Aims: The purposes of this study were to;
1) develop curriculum that promotes SI for nursing students, and 2)
study the effectiveness of the curriculum development. Method:
Research and Development was a method used for this study. The
design was divided into two phases; 1) the curriculum development
which composed of three steps (needs assessment, curriculum
development and curriculum field trail), and 2) the curriculum
implementation. In this phase, a pre-experimental research design
(one group pretest-posttest design) was conducted. The sample
composed of 49 sophomore nursing students of Boromarajonani
College of Nursing, Surin, Thailand who enrolled in Nursing care of
Health problem course I in 2011 academic year. Data were carefully
collected using 4 instruments; 1) Modified essay questions test
(MEQ) 2) Nursing Care Plan evaluation form 3) Group processing
observation form (α = 0.74) and 4) Satisfied evaluation form of
learning (α = 0.82). Data were analyzed using descriptive statistics
and content analysis. Results: The results revealed that the sample
had post-test average score of SI higher than pre-test average score
(mean difference was 5.03, S.D. = 2.84). Fifty seven percentages of
the sample passed the MEQ posttest at the criteria of 60 percentages.
Students demonstrated the strategies of how to develop nursing care
plan. Overall, students- satisfaction on teaching performance was at
high level (mean = 4.35, S.D. = 0.46). Conclusion: This curriculum
can promote the attribute of characteristic of SI person and was
highly required to be continued.
Abstract: A word recognition architecture based on a network
of neural associative memories and hidden Markov models has been
developed. The input stream, composed of subword-units like wordinternal
triphones consisting of diphones and triphones, is provided
to the network of neural associative memories by hidden Markov
models. The word recognition network derives words from this input
stream. The architecture has the ability to handle ambiguities on
subword-unit level and is also able to add new words to the
vocabulary during performance. The architecture is implemented to
perform the word recognition task in a language processing system
for understanding simple command sentences like “bot show apple".