The use of AI in language learning: what you need to know
J Patty - Jurnal Review Pendidikan dan …, 2024 - journal.universitaspahlawan.ac.id
Artificial Intelligence (AI) is a transformative force in education, particularly language
learning. This study discusses the various AI tools employed for language learning, such as …
learning. This study discusses the various AI tools employed for language learning, such as …
Feedback-Irrelevant Mapping: An evaluation method for decoupled few-shot classification
Few-shot classification (FSC) has become a significant area of research in recent years. A
prevalent method in this field is the separation of feature representations from classifiers …
prevalent method in this field is the separation of feature representations from classifiers …
KFFPDet: Android malicious application detection system with assisted detection of adversarial samples
K Kong, L Wang, Z Zhang, Y Li, D Zhao… - Expert Systems with …, 2024 - Elsevier
Abstract Machine learning methods are widely used in Android malware detection, but
carefully scrambled adversarial samples can effectively evade detection. Adversarial …
carefully scrambled adversarial samples can effectively evade detection. Adversarial …
Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control
The integration of artificial intelligence (AI) and the Internet of Things (IoT) in agriculture has
significantly transformed rural farming. However, the adoption of these technologies has …
significantly transformed rural farming. However, the adoption of these technologies has …
[HTML][HTML] Electric vehicle charging technologies, infrastructure expansion, grid integration strategies, and their role in promoting sustainable e-mobility
AR Singh, P Vishnuram, S Alagarsamy, M Bajaj… - Alexandria Engineering …, 2024 - Elsevier
The transport sector is experiencing a notable transition towards sustainability, propelled by
technological progress, innovative materials, and a dedication to environmental …
technological progress, innovative materials, and a dedication to environmental …
IoT-based Facelook and Fingerprint Safe Security System
JM Immanuel, I Ibrahim, R Rahmadewi… - Jurnal Penelitian …, 2024 - jppipa.unram.ac.id
This research aims to develop an advanced safe security system by combining Facelook
and Fingerprint technologies based on the Internet of Things (IoT). These technologies are …
and Fingerprint technologies based on the Internet of Things (IoT). These technologies are …
Structural evaluation of management capability and the mediation role of cybersecurity awareness towards enterprise performance
CZ Oroni, F Xianping - Journal of Data, Information and Management, 2023 - Springer
Abstract Implementation of Cyber Security Awareness (CSA) can inspire both large and
small manufacturing companies to change their internal business processes for improved …
small manufacturing companies to change their internal business processes for improved …
Emerging Trends in Cybersecurity for Critical Infrastructure Protection: A Comprehensive Review
SA Daniel, SS Victor - Computer Science & IT Research Journal, 2024 - fepbl.com
As critical infrastructure becomes increasingly interconnected and digitized, the need for
robust cybersecurity measures to safeguard essential systems is more pressing than ever …
robust cybersecurity measures to safeguard essential systems is more pressing than ever …
Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity Workforce
M Namukasa, M Chaparro Osman, C Ficke… - … Journal of Human …, 2024 - Taylor & Francis
Cybersecurity education heavily utilizes competition-based approaches, such as capture-the-
flag (CTF) games to support the need for a skilled cybersecurity workforce. Although CTFs …
flag (CTF) games to support the need for a skilled cybersecurity workforce. Although CTFs …
[HTML][HTML] Enhancing Cyber Threat Detection with an Improved Artificial Neural Network Model
TS Oyinloye, MO Arowolo, R Prasad - Data Science and Management, 2024 - Elsevier
Identifying cyber-attacks that attempt to compromise digital systems is a critical function of
intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and …
intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and …