Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.128372
Feng Wei
There are many problems in abnormal detection of online English learning behaviour, such as large error and high detection time. Therefore, a detection method based on feature extraction is proposed. Firstly, frequent pattern mining method is used to collect learners' behaviour data, and the data is collected and preprocessed. Then, the classification constraints are set by support vector machine to complete the data classification. Finally, the sequence minimum eigenvalue method is used to train the abnormal data, extract the high frequency features of the abnormal data, establish the anomaly detection model, and realise the anomaly detection. Experimental results show that the highest detection error of this method is 1.2%, and the highest time cost is 1.8 s. Therefore, this method can effectively reduce the detection error and time cost, and is feasible.
{"title":"Study on behaviour anomaly detection method of English online learning based on feature extraction","authors":"Feng Wei","doi":"10.1504/ijris.2023.128372","DOIUrl":"https://doi.org/10.1504/ijris.2023.128372","url":null,"abstract":"There are many problems in abnormal detection of online English learning behaviour, such as large error and high detection time. Therefore, a detection method based on feature extraction is proposed. Firstly, frequent pattern mining method is used to collect learners' behaviour data, and the data is collected and preprocessed. Then, the classification constraints are set by support vector machine to complete the data classification. Finally, the sequence minimum eigenvalue method is used to train the abnormal data, extract the high frequency features of the abnormal data, establish the anomaly detection model, and realise the anomaly detection. Experimental results show that the highest detection error of this method is 1.2%, and the highest time cost is 1.8 s. Therefore, this method can effectively reduce the detection error and time cost, and is feasible.","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10051723
Yanting Cao
{"title":"The fast multi threshold color image segmentation based on decision rough set","authors":"Yanting Cao","doi":"10.1504/ijris.2023.10051723","DOIUrl":"https://doi.org/10.1504/ijris.2023.10051723","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66701890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10056193
Lina Zhao
{"title":"The Perception Method of Sensitive Ideological and Political Teaching Resource Leakage Based on Stain Tracking","authors":"Lina Zhao","doi":"10.1504/ijris.2023.10056193","DOIUrl":"https://doi.org/10.1504/ijris.2023.10056193","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66702060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10053461
Yanjing Li, Di Sun, Yuexia Han
{"title":"A privacy protection method for IoT nodes based on convolutional neural network","authors":"Yanjing Li, Di Sun, Yuexia Han","doi":"10.1504/ijris.2023.10053461","DOIUrl":"https://doi.org/10.1504/ijris.2023.10053461","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66702258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10057748
Wenbin Liu
{"title":"Balanced Scheduling Method of Ideological and Political Teaching Resources Based on Cluster Analysis Algorithm","authors":"Wenbin Liu","doi":"10.1504/ijris.2023.10057748","DOIUrl":"https://doi.org/10.1504/ijris.2023.10057748","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66702474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10057756
Ketong Liu, Xiaojing Guo, Andrea Gao, Kuntai Meng
{"title":"Automatic Fusion Method for Perceptual Data of Internet of Things Based on Kalman Filter","authors":"Ketong Liu, Xiaojing Guo, Andrea Gao, Kuntai Meng","doi":"10.1504/ijris.2023.10057756","DOIUrl":"https://doi.org/10.1504/ijris.2023.10057756","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66702730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10052190
Qing Li
{"title":"Vulnerability assessment method of network topology structure based on maximum likelihood function","authors":"Qing Li","doi":"10.1504/ijris.2023.10052190","DOIUrl":"https://doi.org/10.1504/ijris.2023.10052190","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66701580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijris.2023.10050215
Ling Zhou, Yun Wei
{"title":"Study on privacy node encryption method for wireless sensor networks based on edge computing","authors":"Ling Zhou, Yun Wei","doi":"10.1504/ijris.2023.10050215","DOIUrl":"https://doi.org/10.1504/ijris.2023.10050215","url":null,"abstract":"","PeriodicalId":38715,"journal":{"name":"International Journal of Reasoning-based Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66701742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}