- Natural Language Processing Techniques
- Video Surveillance and Tracking Methods
- Topic Modeling
- Network Security and Intrusion Detection
- Social Robot Interaction and HRI
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Gaze Tracking and Assistive Technology
- Spam and Phishing Detection
- Data Stream Mining Techniques
- Hand Gesture Recognition Systems
- Machine Learning and ELM
- Intelligent Tutoring Systems and Adaptive Learning
- Biomedical Text Mining and Ontologies
- Air Quality Monitoring and Forecasting
- Cloud Computing and Resource Management
- Complex Network Analysis Techniques
- Peer-to-Peer Network Technologies
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Maritime Navigation and Safety
- Face and Expression Recognition
- Human Pose and Action Recognition
- IoT and Edge/Fog Computing
- Speech and dialogue systems
North Carolina Agricultural and Technical State University
2021-2025
St. Bonaventure University
2019
Unitec Institute of Technology
2009-2018
Center Technological University
2012-2015
Corporación Universitaria Unitec
2012-2015
Central American Technological University
2012-2015
Technological University of Mexico
2012-2015
Universidad de Tecnología y Comercio
2012-2015
Auckland University of Technology
2015
National Institute of Information and Communications Technology
2013
There has been an exponential increase in the usage of internet, particularly among students since introduction e-learning and Bring Your Own Device (BYO) initiatives into education system. In New Zealand percentage population using internet is now 93.8% this increased risk cybersecurity attacks. This makes it necessary to provide awareness on who are potential targets for exploitation. However, understand what their current knowledge which forms basis paper. paper presents results a survey...
Abstract Phishing websites are fraudulent that appear legitimate and trick unsuspecting users into interacting with them, stealing their valuable information. Because phishing attacks a leading cause of data breach, different anti‐phishing solutions have been explored for cybersecurity management including machine learning‐based technical approaches. However, there is gap in understanding how robust deep models together hyperparameter optimization website detection. In this vein, study...
In real world situations every model has some weaknesses and will make errors on training data. Given the fact that each certain limitations, aim of ensemble learning is to supervise their strengths weaknesses, leading best possible decision in general. Ensemble based machine a solution minimizing risk making. Bagging, boosting, stacked generalization mixture expert methods are most popular techniques construct systems. For purpose combining outputs class labels, weighted majority voting,...
Machine learning requires sufficient and reliable data to enhance the prediction performance. However, environmental sometimes is short and/or contains missing data. Often existing models built on machine fail predict problems accurately. We argue that spatial domain can be used facilitate training of temporal model. This paper formulates mathematically a aided incremental support vector regression (SalncSVR) for spatio-temporal PM <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were derived only the learning from static data. This paper proposes an online max-flow algorithm streams. Consider a graph learned labelled and unlabelled data, being updated dynamically accommodating adding retiring. In resulting non stationary graph, we augment de-augment paths to update with theoretical guarantee that equals batch retraining. For classification, compute min-cut over current max-flow, so...
The use of computer games as common vehicles for education, opposed to pure entertainment, has gained popularity in recent years. Traditional method diabetes education relies heavily on written materials and there is only a limited amount resources targeted at educating diabetic children. In this paper, we present novel approach designing aimed children with diabetes. Our game design was applied an existing open source (Mario Brothers). results pilot study showed that participants enjoyed...
This study is concerned with computation methods for environmental data analysis in order to enable facilitate effective decision making when addressing air pollution problems. A number of studies often simplify the problem but fail consider fact that a spatio-temporal problem. research addresses as by proposing new decentralized computational technique named Online Scalable SVM Ensemble Learning Method (OSSELM). Special consideration given distributed ensemble resolve collection i.e.,...
Many software systems would significantly improve performance if they could adapt to the emotional state of user, for example intelligent tutoring systems, ATM's and ticketing machines recognise when users were confused, frustrated or angry provide remedial help so improving service. This paper presents research leading development Easy with Eve, an affective (ATS) mathematics. The system detects student emotion, adapts students displays emotion via a lifelike agent called Eve. Eve's is...
Importance of cyber security cannot be denied in the current environment With continuous growth internet, has become a necessity for both big and reputed organizations as well small businesses individuals. Intrusion detection systems (IDS) are considered to an efficient way detecting preventing threats. However, there been not enough attention awareness on intrusion prevention systems, especially among Due this, selection deployment IDS is significance regard this subject being highly...
Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication solutions suffer from deficiencies in either response latency or state recovery consistency, which constrains adoption production.
Malware is an international software disease. Research shows that the effect of malware becoming chronic. To protect against detectors are fundamental to industry. The effectiveness such depends on technology used. Therefore, it paramount advantages and disadvantages each type scrutinized analytically. This study's aim scrutinize existing publications this subject follow trend has taken place in advancement development with reference amount information sources literature. Many programs huge...
In view of the growth Wireless LAN and cyber security threats, status changes in this area becomes essential. Earliest known WarDriving study Auckland Central Business District was carried out 2003. Similar trials were undertaken 2015 to changes, WLAN adoption awareness. According studies, numbers wireless access points have increased significantly from 236 4077. Currently only 0.32% use Ad-hoc mode a less secure mode, while 2003 it 10.17%. 100% encryption enabled compared 40% earlier,...