The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deep learning is a subfield of machine learning which uses artificial neural networks that is inspired by the structure and function of the human brain. Despite being a very new approach, it has become very popular recently. Deep learning has achieved much higher success in many applications where machine learning has been successful at certain rates. In particular It is preferred in the classification...
Undergraduates perform independent research or use research, regardless of their discipline. For most students, this work is part of a formalized experience. However, formalized training in research methods, biases, and disposition is rare; students acquire these skills through mentoring, modeling, and making mistakes, and in the context and content of the discipline. These methods are not ideal....
Ensuring the quality of online learning in higher education institutions is a growing concern in recent years. While several studies have focused on the perception of the quality of online education by academic staff and administrators, this research is based on student perceptions. This study used qualitative methods to investigate the perceptions of students from the Technical University of Moldova...
Deep neural networks have advanced many computer vision tasks, because of their compelling capacities to learn from large amount of labeled data. However, their performances are not fully exploited in semantic image segmentation as the scale of training set is limited, where perpixel labelmaps are expensive to obtain. To reduce labeling efforts, a natural solution is to collect additional images from...
The ability of learning from noisy labels is very useful in many visual recognition tasks, as a vast amount of data with noisy labels are relatively easy to obtain. Traditionally, label noise has been treated as statistical outliers, and techniques such as importance re-weighting and bootstrapping have been proposed to alleviate the problem. According to our observation, the real-world noisy labels...
Despite the fact that the implementation of e-learning tasks has reached advanced ranges in evolved international locations, it is nonetheless in its infancy in many developing international locations and the center east especially. Lately, few public universities in Iraq have initiated restricted tries to apply e-gaining knowledge of along traditional school rooms. However, exclusive limitations...
In this paper we study the problem of key phrase extraction from short texts written in Russian. As texts we consider messages posted on Internet car forums related to the purchase or repair of cars. The main assumption made is: the construction of lists of stop words for key phrase extraction can be effective if performed on the basis of a small, expert-marked collection. The results show that even...
Lately the development of information and communication technologies has led to the creation of a new type of economy, called information economy, based on the introduction of the latest advances in computer technology. The innovative economy expansion requires new advanced approaches in all areas of development, including engineering and economic education. In the last few years, the evolution of...
This article considers the results of a survey of the Internet space in order to identify interest and ideas about innovative activities and readiness for it. Understanding of the essence of innovation activity by respondents, its effectiveness, participation in innovation competitions, awareness of leading innovative programs, participation in the registration of intellectual property and other aspects...
Tor is an anonymous Internet communication system based on the second generation of onion routing network protocol. Using Tor is really difficult to trace the users Internet activity: this is the reason why the usage of Tor is intended in order to protect the privacy of users, their freedom and the ability to conduct confidential communications without being monitored. Tor is even more used by cyber...
Network traffic classification technique is currently a key part of network security systems. In recent years, some network traffic classification algorithms using machine learning based on packet and flow level features have been proposed, yet the results are frequently disappointing. On the one hand, obtaining a large, representative, training data set that is fully labeled to train a classifier...
The adoption of technological techniques in learning and teaching is part of time rationality processes, respect for property, free access, and to facilitate the receive and delivery of educational content. All that by integration of social learning systems, and the reverse process of generating effective e-learning models. Assuming that training people on the method of communication regularly to...
The development of MOOC brings opportunities and challenges to higher education. Based on the analysis of MOOC and traditional classroom teaching, a teaching mode based on MOOC for computer specialty is presented to improve the teacher-centered and rigid teaching mode in traditional education. The proposed teaching mode promotes the teaching reform in favor of the advantages of MOOC and classroom...
In order to meet the needs of China higher education of training students with strong foundation ability and innovation in the filed computer science, in recent years, the computer basic teaching team of Beijing Jiaotong University has carried out a series of scientific and effective educational reforms research and practice: 1. Carrying out “MOOC + SPOC + Flipped classroom” practice; 2. Construction...
In view of the problems of the current teaching content being out of touch with social needs and students' poor practical abilities and other issues, this paper analyzes the new international software engineering training model. Based on the iterative optimization method of updating the teaching idea, optimizing the curriculum system, strengthening the schoolenterprise cooperation and improving teachers'...
With the rapid development of Internet, how to obtain valuable information from massive messages has become a major problem we need to be solved in the information explosive era. This paper introduces the development route of information extraction technology, and discusses four categories of Chinese entity relation extraction technologies in depth. Finally, the advantages and disadvantages of different...
The research of malicious comments in sina weibo is very important. Because a large number of malicious comments seriously undermine the user experience in sina weibo. Based on the malicious comments detection technology named semantic information, this paper gives a different technology which improves the process of malicious dictionary construction and the process of malicious comments detection...
An improved KNN text classification algorithm based on Simhash has been proposed by introducing Simhash and the average Hamming distance of adjacent texts as a unit, which solves the problems caused by data imbalance and the large computational overhead in the traditional KNN text classification algorithms. Experimental results demonstrate that the proposed algorithm performs a higher precision, a...
In order to improve booking tickets experience of the users of Railway Online Ticketing System and ensure the system normally running, Railway Online Ticketing System's users abnormality booking the tickets detection model based on the traditional K-Means and FP-Growth algorithm is proposed. Firstly, preliminary filter user features by the Random Forest Algorithm based on Spark MLlib to identify the...
With the rapid development of mobile Internet, android system becomes the absolute overlord of the operating system, which has an unparalleled influence to the smart phone industry, but also closely related with people's lives. However, the feature of open source and lacking of regulatory of Android system led to a lot of security risks. Because of the widespread use of Android Intent Mechanism, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.