The popularity of virtual reality headsets have been rapidly increasing. With this technology, students can efficiently interact with the course content and learn the material faster than the traditional methodologies. In addition to this benefit, virtual reality devices also draw the attention of young generation and this helps to the widespread use of this technology among students. In this study, we investigate the use of virtual reality on the performance of computer engineering bachelor science (BS) students within the scope of Data Structures course and develop a software‐intensive system called “Virtual Reality Enhanced Interactive Teaching Environment” (VR‐ENITE). Specifically, we focus on the sorting algorithms such as selection sort, bubble sort, insertions sort, and merge sort which are relatively hard to be understood by the BS students at first glance. For the evaluation of VR‐ENITE, students were divided into two groups: a group which uses VR‐ENITE in addition to the traditional teaching material and the control group which utilizes from only the traditional material. In order to evaluate the performance of these two groups having 36 students in total, a multiple choice exam was delivered to all of them. According to the test results, students who used the VR‐ENITE system got 12% more successful results in average than the students who are in the control group. This study experimentally shows that VR‐ENITE which is based on virtual reality technology is effective for teaching software engineering courses and it has assistive capabilities for traditional teaching approaches.
Early and effective network intrusion detection is deemed to be a critical basis for cybersecurity domain. In the past decade, although a significant amount of work has focused on network intrusion detection, it is still a challenge to establish an intrusion detection system with a high detection rate and a relatively low false alarm rate. In this paper, we have performed a comprehensive empirical study on network intrusion detection as a multiclass classification task, not just to detect a suspicious connection but also to assign the correct type as well. To surpass the previous studies, we have utilized four deep learning models, namely, deep neural networks, long short‐term memory recurrent neural networks, gated recurrent unit recurrent neural networks, and deep belief networks. Our approach relies on the pretraining of the models by exploiting a particle swarm optimization–based algorithm for their hyperparameters selection. In order to investigate the performance differences, we also included two well‐known shallow learning methods, namely, decision forest and decision jungle. Furthermore, we used in our experiments four datasets, which are dedicated to intrusion detection systems to explore various environments. These datasets are KDD CUP 99, NSL‐KDD, CIDDS, and CICIDS2017. Moreover, 22 evaluation metrics are used to assess the model's performance in each of the datasets. Finally, intensive quantitative, Friedman test, and ranking methods analyses of our results are provided at the end of this paper. The results show a significant improvement in the detection of network attacks with our recommended approach.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.