The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the...The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the healthy growth and comprehensive development of the art majors. In this paper, the ideological education and managemenl model for the art majors in institutions of higher learning in the new oeriod are studied, hooing to attract more scholars to focus on this tooic.展开更多
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv...Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.展开更多
As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurit...As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.展开更多
In the education sector,blockchain is currently at the end of the peak of inflated expectations in Gartner’s Hype Cycle.Thus,it is crucial to understand whether this technology meets the expectations of Higher Educat...In the education sector,blockchain is currently at the end of the peak of inflated expectations in Gartner’s Hype Cycle.Thus,it is crucial to understand whether this technology meets the expectations of Higher Education Institutions(HEIs).We go on an expedition to identify blockchain application scenarios and its potential for HEI administration-the universities are digitalized to just 23.3%.Current information systems research addresses classifications of blockchain-based projects(application level)rather than their technical realization(protocol level).Thus,when evaluating blockchain application scenarios in HEI administration,we intensively consider the technical side of blockchain-based projects.We perform a threestep approach:(1)systematic literature review,(2)qualitative exploratory semi-structured interviews to sup-plement information on market-ready solutions,and(3)an evaluation of the potential of the blockchain-based projects identified,based on HEI administration requirements.We find that the leading blockchain application scenarios are credential verification and record-sharing.At the protocol level,we obtain equivocal results regarding the technical realization of projects,e.g.,their underlying blockchain types and storage models.At the application level,when discussing the potential of different projects,we find that most of them address adaptability,complexity decomposition,and cost reduction requirements between HEIs;interest diversity and stakeholder collaboration between HEIs and business actors;privacy and trust between HEIs and students.展开更多
文摘The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the healthy growth and comprehensive development of the art majors. In this paper, the ideological education and managemenl model for the art majors in institutions of higher learning in the new oeriod are studied, hooing to attract more scholars to focus on this tooic.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.
基金funded by the German Federal Ministry of Education and Research under the funding code 534800.The responsibility for the content of this publication lies with the authors.
文摘In the education sector,blockchain is currently at the end of the peak of inflated expectations in Gartner’s Hype Cycle.Thus,it is crucial to understand whether this technology meets the expectations of Higher Education Institutions(HEIs).We go on an expedition to identify blockchain application scenarios and its potential for HEI administration-the universities are digitalized to just 23.3%.Current information systems research addresses classifications of blockchain-based projects(application level)rather than their technical realization(protocol level).Thus,when evaluating blockchain application scenarios in HEI administration,we intensively consider the technical side of blockchain-based projects.We perform a threestep approach:(1)systematic literature review,(2)qualitative exploratory semi-structured interviews to sup-plement information on market-ready solutions,and(3)an evaluation of the potential of the blockchain-based projects identified,based on HEI administration requirements.We find that the leading blockchain application scenarios are credential verification and record-sharing.At the protocol level,we obtain equivocal results regarding the technical realization of projects,e.g.,their underlying blockchain types and storage models.At the application level,when discussing the potential of different projects,we find that most of them address adaptability,complexity decomposition,and cost reduction requirements between HEIs;interest diversity and stakeholder collaboration between HEIs and business actors;privacy and trust between HEIs and students.