Results (242)
Search Parameters:
Section: cisIntrusion Detection and Classification using Decision Tree Based Key Feature Selection Classifiers
Feature selection method applied on an intrusion dataset is used to classify the intrusion data as normal or intrusive. We have made an attempt to detect and classify the intrusion data using rank-based feature selection classifiers. A set of redundant features having null rank value are eliminated then the performance evaluation using various feature selection…
Read MoreMulti-Model Security and Social Media Analytics of the Digital Twin
Digital twins act through application programming interfaces to their physical counterparts to monitor, model, and control them. Beyond these traditional functions of digital twins, they must also act to secure their physical counterparts. A multi-model scheme is presented to help digital twins towards the task of securing the physical system. Additionally, this work includes an…
Read MoreOvermind: A Collaborative Decentralized Machine Learning Framework
This paper is an extension of work originally presented in PM2.5 Prediction-based Weather Forecast Information and Missingness Challenges: A Case Study Industrial and Metropolis Areas, which focused on imputation algorithm to solve missingness challenge and demonstrated a basic prediction system to prove the proposed algorithm, II-MPA. Distributed and decentralized systems, recently, have been proven for…
Read MoreA Comprehensive Review of Traditional Video Processing
Video and its processing are an interesting area as the increase in usage of internet videos, online streaming, CCTV, impact of internet on normal crowd increased. The need to know about video and its processing become an eminent area in research in current era. The paper tries to cover the traditional video processing, the advancement…
Read MoreIT GRC Smart Adviser: Process Driven Architecture Applying an Integrated Framework
This article is a continuation of the work presented in the Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). In this version we focus on matching IT and business processes from different management levels by using IT-Governance (ITG) Risk and Compliance frameworks in a smart way. In fact, every information system…
Read MoreThe Effect of E-Service Quality on Customer Satisfaction and Loyalty (Case Study at E-Marketplace XYZ in Indonesia)
Online transactions make it easy for people to get products or sell the products through online applications. The success and failure of online sales depends on how satisfied and loyal the customer is to the service of the product or business which can certainly influence and increase competition between the online sales industry. Based on…
Read MoreInferring Topics within Social Networking Big Data, Towards an Alternative for Socio-Political Measurement
This research sought to measure some socio-political indicators using millions of opinionated messages from social network sourced big data. Thus, and using an enhanced mixed method for sentiment analysis and a fusion model algorithm to infer topics from short text, this study attempted to demonstrate the value of computational approaches in measuring some phenomena in…
Read MoreUnderstanding the usage, Modifications, Limitations and Criticisms of Technology Acceptance Model (TAM)
Technology Acceptance Model (TAM) is broadly accepted and has proved applicable in identifying consumers’ willingness to utilize information and communication technology (ICT). The theory proposes that Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) are actually determining factors of individual attitudes, while attitude is a determining factor of Behavioural Intention (BI) and Behavioural Intention…
Read MoreUsing TOST in Teaching Operating Systems and Concurrent Programming Concepts
The paper is aimed as a concise and relatively self-contained description of the educational environment TOST, used in teaching and learning Operating Systems basics such as Processes, Multiprogramming, Timesharing, Scheduling strategies, and Memory management. TOST also aids education in some important IT concepts such as Deadlock, Mutual exclusion, and Concurrent processes synchronization. The presented integrated…
Read MoreEffective Segmented Face Recognition (SFR) for IoT
Face recognition technology becoming pervasive in the fields of computer vision, image processing, and pattern recognition. However, face recognition accuracy rates will decrease if training is done on disguised images with covered objects on a face area. This paper aims to propose a state-of-the-art face recognition methodology which could be applied in Internet of Things…
Read MoreAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MoreSynthesis of SQL Queries from South African Local Language Narrations
English remains the language of choice for database courses and widely used for instruc- tion in nearly all South African universities, and also in many other countries. Novice programmers of native origins are mostly taught Structured Query Language (SQL) through English as the medium of instruction. Consequently, this creates a myriad of problems in understanding…
Read MoreNature Inspired and Transform Based Image Encryption Techniques: A Comparative Study
In this paper, performances of two variations of chaos based algorithms are compared. First algorithm is a self-adaptive color image encryption algorithm is proposed based on Radial Hilbert Transform and chaos. This technique uses chaotic random phase masks operated on the transformed pixels to increase the randomness in confusion and diffusion operations. Also, a random…
Read MoreComparison by Correlation Metric the TOPSIS and ELECTRE II Multi-Criteria Decision Aid Methods: Application to the Environmental Preservation in the European Union Countries
This article is part of the field of Multi-Criteria Decision Aid (MCDA), where several criteria must be considered in decision making. All criteria are generally as varied as possible and express different dimensions, and aspects of the decision problem posed. For more than four decades, several MCDA methods have emerged and have been applied perfectly…
Read MorePerformance Analysis of Selective Repeat ARQ Protocol Used in Digital Data Transmission Over Unreliable Channels
Stop and Wait (SW) ARQ, Go Back N (GBN) ARQ, and Selective Repeat (SR) ARQ are the main ARQ (Automatic-Repeat-reQuest) protocols used to ensure reliable delivery of digital data at correct sequence. These protocols are implemented at the DLC (Data Link Control) sub layer of Data Link Layer (DLL) of OSI (Open System Interconnection) network…
Read MoreInnovative Course Delivery using Analyze – Group – Design – Optimize (AGDO) Methodology: Case Study of Entity-Relationship Model
Visualization plays an important role in teaching and learning. The ability of the learner to grasp the visual contents are better than that of textual contents. Traditional teaching methods often revolved around instructions and recitation techniques. However, most of these approaches were dormant and did not call for active learning. The proposed AGDO- Analyze, Group,…
Read MorePrototype for the Management of Engineering Companies and the ICT to Improve the Quality of Services
Information on alternative technologies or new prototypes was analyzed to help improve the quality of business management services. The problem is the lack of application of new technologies that improve the quality of service and reduce disagreements in the management of organizations. The objective is to present a prototype for the management of engineering and…
Read MoreSmartphone Influence Factor of University Student’s Academic Achievement
The smartphone is a phenomenal device or tool that recently transform the habit of people. In this part, the smartphone serves not only as a communication device but also more complex functionality. The early research reported that smartphones are used by university students to support their social and academic activities. However, the research report that…
Read MoreButterfly Life Cycle Algorithm for Measuring Company’s Growth Performance Based on BSC and SWOT Perspectives
Previous study of butterfly life-cycle algorithms (BLCA) has been done to construct a novel algorithm by impersonating the life-cycle of a real butterfly. The algorithm was tested in measuring the company’s growth performance using a balanced scorecard (BSC) strategic planning model. This paper is proposed to continue the previous study by expanding the concept in…
Read MoreKnowledge Mapping of Virtual Academic Communities: A Bibliometric Study Using Visual Analysis
This study aims to provide a systematic and complete knowledge map for researchers in the field of virtual academic communities (VACs) and to help them quickly understand the key knowledge, evolution trends and research frontiers. This paper adopts the bibliometric method, with the help of bibliometric analysis software Citespace and VOSviewer quantitative analyze the retrieved…
Read MoreMalware Classification Using XGboost-Gradient Boosted Decision Tree
In this industry 4.0 and digital era, we are more dependent on the use of communication and various transaction such as financial, exchange of information by various means. These transaction needs to be secure. Differentiation between the use of benign and malware is one way to make these transactions secure. We propose in this work…
Read MoreComparative Study of Cryptocurrency Algorithms: Coronavirus Towards Bitcoin’s Expansion
The widespread presence of Coronavirus (COVID-19) is causing organizations and individuals major economics downsizing. The way this virus is transmitted from one individual to another is the real cause of the problem. For that, researchers in different fields started seriously looking for touch-less and contact-less exchange. Particularly in the finance world, cash transactions and keypad…
Read MoreNew Algorithm for the Development of a Musical Words Descriptor for the Artificial Composition of Oriental Music
The Music Composition Library of the great composers constitutes an intellectual heritage. This article introduces an algorithm of artificial Oriental composing music based on the descriptors determined on a large learning base to automatically write Oriental music as the logic identical to any composer. Musical words are called a grammatical alphabet. Each word derived is…
Read MoreSentiment Analysis on Utilizing Online Transportation of Indonesian Customers Using Tweets in the Normal Era and the Pandemic Covid-19 Era with Support Vector Machine
Online transportation in Indonesia is a new trend of transportation that is currently used among the lower to upper society. The change in behavior began in 2011 and is growing to this day, The comments that are growing on social media are very important for the online transportation company the negative comments lower the level…
Read MoreComponent of Trust for Developing Crowdwork System: A Systematic Literature Review
Crowdwork is a system that brings job providers and crowdworkers in a portal. Nowadays, many companies are turning to freelancing rather than hiring full-time employees. In addition, the workers have also switched to working as freelancers. New problems also arise in the crowdwork system. Trust is one of the main issues that arise in the…
Read More
