Results (318)
Search Parameters:
Keyword: MACInnovations in Recruitment—Social Media
The main objective and contribution of the paper is to describe the creation of a model to support recruitment using social media information and its deployment in practice. The model includes the design of an automated solution for downloading social media data and a proposal for the subsequent analysis and creation of a predictive model…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreCyberbullying Detection by Including Emotion Model using Stacking Ensemble Method
Cyberbullying is a serious problem and caused an immense impact to the victim. To prevent the cyberbullying, the solution is to develop an automatic detection system. In this research, we propose a combined model for cyberbullying detection and emotion detection by using stacking method. The experiment is to create a better model for cyberbullying detection…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MorePersonalized Clinical Treatment Selection Using Genetic Algorithm and Analytic Hierarchy Process
The development of Machine Learning methods and approaches offers enormous growth opportunities in the Healthcare field. One of the most exciting challenges in this field is the automation of clinical treatment selection for patient state optimization. Using necessary medical data and the application of Machine Learning methods (like the Genetic Algorithm and the Analytic Hierarchy…
Read MoreDevices and Methods for Microclimate Research in Closed Areas – Underground Mining
Technical safety and health are especially important for mining-extracting industry. Even though the respective lows and good engineering practices exist, technologies develop and could address even better security for humans and equipment. The research question is to survey microclimate sensors in underground mining and to find whether they are ready for automation. The article is…
Read MoreInitial Experiments using Game-based Learning Applied in a Classical Knowledge Robotics in In-Person and Distance Learning Classroom
This paper addresses experiments with Scratch-developed games in the robotics introduction course at the Federal University of Technology – Paraná. It aims at assisting learning of classical and initial robotics concepts. This proposal, similar to the classic 80s war tanks game on Atari 2600, was developed using an autonomous vehicle. In the first experiment, applied…
Read MoreEfficiency Comparison in Prediction of Normalization with Data Mining Classification
In research project, efficiency comparison study in prediction of normalization with data mining classification. The purpose of the research was to compare three normalization methods in term of classification accuracy that the normalized data provided: Z-Score, Decimal Scaling and Statistical Column. The six known classifications: K-Nearest Neighbor, Decision Tree, Artificial Neural Network, Support Vector Machine,…
Read MoreKamphaeng Saen Beef Cattle Identification Approach using Muzzle Print Image
Identification of Kamphaeng Saen beef cattle is important of the registration and traceability purposes. For a traditional identification methods, Hot Branding, Freeze Branding, Paint Branding, and RFID Systems can be replaced by genius human. This paper proposed a Kamphaeng Saen beef cattle identification approach using muzzle print images as an Animal Biometric approach. There are…
Read MoreAdvanced Physical Failure Analysis Techniques for Rescuing Damaged Samples with Cracks, Scratches, or Unevenness in Delayering
This paper is an extended version of work published in IPFA 2020. In the previous paper, advanced physical failure analysis (PFA) techniques for rescuing damaged samples with cracks, scratches, or unevenness in delayering are introduced. In the present work, the techniques will be further exploited and summarized for the potential applications in general devices. The…
Read MoreRecognition of Emotion from Emoticon with Text in Microblog Using LSTM
With the advent of internet technology and social media, patterns of social communication in daily lives have changed whereby people use different social networking platforms. Microblog is a new platform for sharing opinions by means of emblematic expressions, which has become a resource for research on emotion analysis. Recognition of emotion from microblogs (REM) is…
Read MoreA Survey of Big Data Techniques for Extracting Information from Social Media Data
Data mined from social media can be used in a variety of methods. The goal of this paper is to explore some of the various methods of mining data from social media and the different areas of its applications. From the analysis of other studies, it was clear that methods such as text analysis, classification,…
Read MorePerformance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System
Face Recognition (FR) is considered as a heavily studied topic in computer vision field. The capability to automatically identify and authenticate human’s faces using real-time images is an important aspect in surveillance, security, and other related domains. There are separate applications that help in identifying individuals at specific locations which help in detecting intruders. The…
Read MoreEfficient 2D Detection and Positioning of Complex Objects for Robotic Manipulation Using Fully Convolutional Neural Network
Programming industrial robots in a real-life environment is a significant task necessary to be dealt with in modern facilities. The “pick up and place” task is undeniably one of the regular robot programming problems which needs to be solved. At the beginning of the “pick and place” task, the position determination and exact detection of…
Read MoreSecuring IPv6 Neighbor Discovery using Pre-Shared Key
Neighbor Discovery Protocol (NDP) is used to discover the MAC address of the connected hosts in Internet Protocol Version 6 (IPv6) in a networked environment. Neighbor Cache Entry (NCE) table holds the association between a host’s IP address and MAC address. However, according to the protocol, the MAC address could be overwritten by sending a…
Read MoreFood Price Prediction Using Time Series Linear Ridge Regression with The Best Damping Factor
Forecasting food prices play an important role in livestock and agriculture to maximize profits and minimizing risks. An accurate food price prediction model can help the government which leads to optimization of resource allocation. This paper uses ridge regression as an approach for forecasting with many predictors that are related to the target variable. Ridge…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreUsing Supervised Classification Methods for the Analysis of Multi-spectral Signatures of Rice Varieties in Panama
In this article supervised classification methods for the analysis of local Panamanian rice crops using Near-Infrared (NIR) spectral signatures are assessed. Neural network ( Multilayer Perceptron-MLP) and Tree based (Decision Trees-DT and Random Forest-RF) algorithms are used as regression and supervised classification of the spectral signatures by rice varieties, against other crops and by plant…
Read MoreA Model for the Application of Automatic Speech Recognition for Generating Lesson Summaries
Automatic Speech Recognition (ASR) technology has the potential to improve the learning experience of students in the classroom. This article addresses some of the key theoretical areas identified in the pursuit of implementing a speech recognition system, capable of lesson summary generation in the educational setting. The article discusses: some of the applica- tions of…
Read MoreStudents’ Preparedness to Learn in e-Learning Environment and their Perception on The MPKT Lecturers’ Readiness to Manage Online Class
This study has two objectives: to determine the level of readiness of first-year undergraduate students at the Universitas Indonesia (UI) and to investigate student’s perception of MPKT (Integrated Character Development course) lecturers’ readiness to manage online learning class. Proportional cluster sampling was applied, and 1466 freshmen from thirteen faculties participated. Data clustering and imputation of…
Read MoreImproved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach
Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…
Read MoreForecasting Gold Price in Rupiah using Multivariate Analysis with LSTM and GRU Neural Networks
Forecasting the gold price movement’s volatility has essential applications in areas such as risk management, options pricing, and asset allocation. The multivariate model is expected to generate more accurate forecasts than univariate models in time series data like gold prices. Multivariate analysis is based on observation and analysis of more than one statistical variable at…
Read MoreThe Analysis of Standard Uncertainty of Six Degree of Freedom (DOF) Robot
Robotic arms or industrial robots are a machinery that is widely used in the medical and military industries because it is a flexible, highly accurate and reliable. It is very necessary to work in complex tasks requiring more accuracy than humans can work. This paper presents an estimate of the standard uncertainty of 6 DOF…
Read MoreEvent Modeller Data Analytic for Harmonic Failures
The optimum performance of power plants has major technical and economic benefits. A case study in one of the Malaysian power plants reveals an escalating harmonic failure trend in their Continuous Ship Unloader (CSU) machines. This has led to a harmonic filter failure causing performance loss leading to costly interventions and safety concerns. Analysis of…
Read MoreAn algorithm for Peruvian counterfeit Banknote Detection based on Digital Image Processing and SVM
In this work we propose an algorithm for Peruvian counterfeit banknotes detection. Our algorithm operates in banknotes with 50, 100 and 200 soles denominations that were manufactured from 2009 onwards. This algorithm offers an automatic diagnosis based on digital image processing and support vector machines (SVM). Current Peruvian counterfeit detection systems are specially designed to…
Read More
