Cluster analysis is the prominent data mining technique in knowledge discovery and it discovers the hidden patterns from the data. The K-Means, K-Modes and K-Prototypes are partition based clustering algorithms and these...
Online learning is part of the future of K-12 education. However, few online K-12 instructors have been formally trained in online pedagogy. This chapter describes best practices in creating online courses for K-12 students....
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
Recently, due to the advance and impressive results of deep learning techniques in the fields of image recognition, natural language processing and speech recognition for various long-standing artificial intelligence (AI) tasks...
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
The recent techniques built on cloud computing for data processing is scalable and secure, which increasingly attracts the infrastructure to support big data applications. This paper proposes an effective anonymization based...
The weather has a serious impact on the environment as it affects to change day to day life. In recent days, many algorithms were proposed to predict the weather. Although various machine learning algorithms predict the weather...
Very few academic programs in pre-service teacher education include opportunities for current and future K-12 educators to develop the necessary skills to teach in an online setting. While limited research has been done related...
Nowadays, in online social networks, there is an instantaneous extension of multimedia services and there are huge offers of video contents which has hindered users to acquire their interests. To solve these problem different...
Although K–12 online education is becoming more common in the United States, there is still much we do not know about how K–12 online teachers are being prepared. Given that few teacher education programs include online pedagogy...
Taking the one-year-old T. chinensis (Tamarix chinensis Lour.) in Yellow River Delta as the study object, the variations of C, N and P stoichiometry in T. chinensis under drought stress was studied using pot experiments. The...
With the development of internet of things (IoT) technology, servitization of IoT device functions has become a trend. The cooperation between IoT devices can be equivalent to web service composition. However, current service...
The field of information retrieval (IR) is an important area in computer science, this domain helps us to find information that we are interested in from an important volume of information. A search engine is the best example of...
PPG signal utilize the light-based method to sense the blood-flow-rate as controlled by the actions of heart’s pumping. It is extensively utilized in the healthcare with application ranging from the pulse oximetry in the serious...
Air pollution is increasing day by day, decreasing the world economy, degrading the quality of life, and resulting in a major productivity loss. At present, this is one of the most critical problems. It has a significant impact...
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web...
An American K-12 cooperative educational services provider (“The Agency”) has an issue: partner school districts are saving money by building internal capacity for professional development, rather than fully utilizing expertise...
Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing...
Cardio Vascular Diseases (CVD) is the major reason for the death of the majority of the people in the world. Earlier diagnosis of disease will reduce the mortality rate. Machine learning (ML) algorithms are giving promising...
McShane’s Essay, “Method in Theology: From [1 + 1/n]nx to {M (W3)θΦT}4”, takes off from a puzzling piece of a 1954 letter of Lonergan to Fred Crowe, which Crowe and McShane both struggled with, and pushes forward to a more...
This quantitative study examined the frequency of usage and teacher perception of educational technology by K - 12 public school teachers in three geographic settings: urban, rural, and suburban. The objective aimed to uncover...
The Mediterranean basin is a global hotspot of biodiversity. Woody plants are key components of ecosystems. This article explores the environmental impacts on woody plant species richness and diversity in maquis and abandoned...
This chapter considers the impact the COVID-19 pandemic has had on the reality of educational administrators in U.S.-based institutions of education. Looking closely at 17 educational administrators from both K-12 systems and...