![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Introducing Coding to Children with Scratch: A Pilot Study
As digital literacy is necessary in the modern workplace, programming or coding skills have been deemed as an important competence in 21st century education. However, learning to code or program is generally p...
-
Chapter and Conference Paper
A Pilot Study of Learning Programming with ScratchJr
Embedding technological tools in learning and providing learning environment that can support wider use of technology to equip students with computational thinking have become the trend in education. Computati...
-
Chapter and Conference Paper
Modified TPACK Framework for Teachers’ Efficiency, Students’ Performance and Students’ Engagement
In the digital era, the environment of the classroom had gone through a drastic change where technology is slowly being introduced. Instead of conducting classes and lessons through the traditional or rather c...
-
Chapter and Conference Paper
Proposed Integration of Mobile Interactive System in the Classroom
In the twenty-first century, there are many technologies available to assist us in our daily lives. One of the most commonly owned technology is mobile technology. Due to its nature of high mobility and easier...
-
Article
Toward forecasting future day air pollutant index in Malaysia
The association of air pollution and the magnitude of adverse health effects are receiving close attention from the world. The effects of air pollution were found to be most significant for children, elderly, ...
-
Chapter and Conference Paper
Contactless Patient Authentication for Registration Using Face Recognition Technology
Patient registration is an essential process in every clinic and hospital before services are provided to patients. Usually, patient’s identity card or fingerprint (through a fingerprint scanner) will be reque...
-
Chapter and Conference Paper
A Sequential Approach to Network Intrusion Detection
In this paper, we combine the sequential modeling capability of Recurrent Neural Network (RNN), and the robustness of Random Forest (RF) in detecting network intrusions. Past events are modelled by RNN, captur...
-
Chapter and Conference Paper
Decision Tree with Sensitive Pruning in Network-based Intrusion Detection System
Machine learning techniques have been extensively adopted in the domain of Network-based Intrusion Detection System (NIDS) especially in the task of network traffics classification. A decision tree model with ...
-
Article
Temporal Sleuth Machine with decision tree for temporal classification
Temporal data classification is an extension field of data classification, where the observed datasets are temporally related across sequential domain and time domain. In this work, an inductive learning tempo...
-
Article
Enhanced independent spectral histogram representations in face recognition
A spectral histogram descriptor computes a set of marginal distributions based on the filter bank’s responses, and further encodes them into the images. The encoding process for local image structure takes pla...
-
Chapter and Conference Paper
Vulnerability Reports Consolidation for Network Scanners
Vulnerability scanning is one of the vital process conducted by many penetration testers and security consultants as to assess the security of an organizational network. However, when multiple vulnerability s...
-
Article
Temporal sampling forest ( \(\varvec{\textit{TS-F}}\) ): an ensemble temporal learner
Ensemble learning is in favour of machine learning community due to its tolerance in handling divergence and biasness issues faced by a single learner. In this work, an ensemble temporal learner, namely tempor...
-
Chapter
Experimental Study of Elman Network in Temporal Classification
Elman network is an extension of multilayer perceptron (MLP), where it introduces single hidden layer architecture, as well as an additional state table to store the time units for hidden neurons. This additio...
-
Chapter and Conference Paper
Classifying Human Activities with Temporal Extension of Random Forest
Sensor-Based Human Activity Recognition (HAR) is a study of recognizing the human’s activities by using the data captured from wearable sensors. Avail the temporal information from the sensors, a modified vers...
-
Chapter and Conference Paper
Biometric Access Control with High Dimensional Facial Features
Access control is vital to prevent adversary from stealing resources from data centres. The security of traditional authentication means, such as password and Personal Identification Number (PIN), are imperfec...
-
Chapter and Conference Paper
Anomaly Based Intrusion Detection through Temporal Classification
Many machine learning techniques have been used to classify anomaly-based network intrusion data, encompassing from single classifier to hybrid or ensemble classifiers. A nonlinear temporal data classification...