Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Angular-axes features (1)
- Business Process Reengineering (1)
- Churn prediction (1)
- Classification (1)
- Clustering (1)
-
- Convolutional neural network (CNN) (1)
- Critical Success Factors (1)
- Data Mining (1)
- Data mining and Prediction model. (1)
- Deep learning (1)
- Discrete Wavelet Transform (1)
- Image Hiding (1)
- Intension to use (1)
- Internet (1)
- Keywords: Freezing of Gait (FoG) (1)
- LU factorization (1)
- Machine learning (1)
- Multilayer perceptron (1)
- Parkinson's Disease (PD) (1)
- QR factorization (1)
- Quality metrics (1)
- Quality of service (1)
- Recommendation system (1)
- Self-Efficacy (1)
- Spectrogram (1)
- Steganography (1)
- Web-Based E-Learning (1)
- Whale optimization (1)
Articles 1 - 7 of 7
Full-Text Articles in Other Computer Engineering
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Future Computing and Informatics Journal
Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Future Computing and Informatics Journal
The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …
Performance Analysis Of Whale Optimization Based Data Clustering, Ahamed Shafeeq B M, Zahid Ahmed Ansari, Shyam Karanth
Performance Analysis Of Whale Optimization Based Data Clustering, Ahamed Shafeeq B M, Zahid Ahmed Ansari, Shyam Karanth
Future Computing and Informatics Journal
Data clustering is the method of gathering of data points so that the more similar points will be in the same group. It is a key role in exploratory data mining and a popular technique used in many fields to analyze statistical data. Quality clusters are the key requirement of the cluster analysis result. There will be tradeoffs between the speed of the clustering algorithm and the quality of clusters it produces. Both the quality and speed criteria must be considered for the state-of-the-art clustering algorithm for applications. The Bio-inspired technique has ensured that the process is not trapped in …
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Future Computing and Informatics Journal
In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …
Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad
Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad
Future Computing and Informatics Journal
A common symptom of Parkinson's Disease is Freezing of Gait (FoG) that causes an interrupt of the forward progression of the patient’s feet while walking. Therefore, Freezing of Gait episodes is always engaged to the patient's falls. This paper proposes a model for Freezing of Gait episodes detection and prediction in patients with Parkinson's Disease. Predicting Freezing of Gait in this paper considers as a multi-class classification problem with 3 classes namely, FoG, pre-FoG, and walking episodes. In this paper, the extracted feature scheme applied for the detection and the prediction of FoG is Convolutional Neural Network (CNN) spectrogram time-frequency …
A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami
A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami
Future Computing and Informatics Journal
Due to the changing dynamics of the business environment, organizations need to redesign or reengineer their business processes in order to provide services with the lowest cost and shortest response time while increasing quality. Thence, Business Process Re-engineering (BPR) provides a roadmap to achieve operational goals that leads to enhance flexibility and productivity, cost reduction, and quality of service/product. In this paper, we propose a literature review for the different proposed models for Business Process Reengineering. The models specify where the breakdowns occur in BPR implementation, justifies why such breakdowns occur, and propose techniques to prevent their occurrence again. The …