Results (242)
Search Parameters:
Section: cisDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreTowards Directing Convolutional Neural Networks Using Computational Geometry Algorithms: Application to Handwritten Arabic Character Recognition
Suppose we want to classify a query item Q with a classification model that consists of a large set of predefined classes L and suppose we have a knowledge that indicates to us that the target class of Q belongs to a small subset from L. Naturally, this filtering will improve the accuracy of any…
Read MoreA User-Item Collaborative Filtering System to Predict Online Learning Outcome
Education has seen the rapid development of online learning. Many researchers have conducted studies on the use of recommendation systems in online learning. However, until now, several similar studies still focus on the accuracy of the prediction results. Various obstacles were encountered related to changes in the face to face learning process into online learning.…
Read MoreGeneric Decision Support Model for Determining the Best Marketer
For marketing company, determining the best marketing is a strategic decision. It is able to affect the companys future purposefully. The study conducted to propose a novel decision support model (DSM) for determining the best marketer. Seventeen parameters were considered into model and two methods fuzzy logic and profile-matching (PM) were combined as main method…
Read MoreDetermination of ERP Readiness Assessment using Agile Parameters: A Case Study
At present, in the era of digitization the organizations need Enterprise Resource Planning (ERP) systems to have the ability adapt to changes with rapid response in order to increase the competitive advantage. The fact, many companies have failed to implement ERP which is proven to be not go live on time, so that the implementation…
Read MoreDeep Learning Approach for Automatic Topic Classification in an Online Submission System
Topic classification is a crucial task where knowledge categories exist within hierarchical information systems designed to facilitate knowledge search and discovery. An application of topic classification is article (e.g., journal/conference paper) classification which is very useful for online submission systems. In fact, numerous online journals/magazine submission systems usually receive thousands of article submissions or even…
Read MoreIoT Based Human Activity Recognition System Using Smart Sensors
Internet of Things provides a virtual view of real-life things by guiding challenges faced by persons in daily life. It is reforming our world with trillions of sensors and other IoT enabled devices by creating a smart environment. Effective use of IoT sensors in various smart IoT applications is very important. After analyzing different sensor…
Read MoreDiffusion of Technology for Language Challenges in the South African Healthcare Environment
Even though mobile technologies are increasingly used to enable communications between providers and receivers of healthcare services, there remain severity challenges owing to the use of various indigenous languages in many Africa countries. Some of the challenges get worst in a countries like South Africa where there are eleven official languages. As a result, interpreters…
Read MoreUtilization of Data Mining to Predict Non-Performing Loan
In the banking industry, the existence of problem loans is inevitable. NPL (Non-Performing Loan) will certainly have an impact on the reduction in the capital of a bank. One good step in reducing the risk of credit default or the emergence of non-performing loans is to take proper care of debtors who begin to experience…
Read MoreNearest Neighbour Search in k-dSLst Tree
In the last few years of research and innovations, lots of spatial data in the form of points, lines, polygons and circles have been made available. Traditional indexing methods are not perfect to store spatial data. To search for nearest neighbour is one of the challenges in different fields like spatiotemporal data mining, computer vision,…
Read MoreContribution in Private Cloud Computing Development based on Study and KPI Analysis
The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…
Read MoreFraud Detection Call Detail Record Using Machine Learning in Telecommunications Company
Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…
Read MoreA Mobile Application Design to Prevent Criminal Acts in Lima, Peru
In the province of Lima, Peru, criminal acts are increasing every day; it is a social problem that affects many people, who often try with the life of the indignant person, becoming the greatest fear of the community. For this reason, a mobile application was designed that allows the inhabitants to report and share the…
Read MoreCitizen Behavior: The Evaluation of Complaint Application that Connected to Smart City
SIARAN is application which is created by Government of South Tangerang City, Indonesia. The application is e-government services social media based. It is designed for citizens to be able to report problems that occur around South Tangerang City. The research was conducted to find out the factors that affect the intention of SIARAN’s users. The…
Read MoreA Novel Representative k-NN Sampling-based Clustering Approach for an Effective Dimensionality Reduction-based Visualization of Dynamic Data
Visualization plays a crucial role in the exploratory analysis of Big Data. The direct visualization of Big Data is a challenging task and difficult to analyze. Dimensionality Reduction techniques extract the features in the context of visualization. Due to the unsupervised and non-parametric nature, most of the dimensionality reduction techniques are not evaluated quantitatively and…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read MoreThe Design of an Experimental Model for Deploying Home Area Network in Smart Grid
In the smart power grid, designing an efficient and reliable communication architecture has an important role in improving efficiency, and maintaining the connectivity of different network components. The home area network (HAN) provides an energy management system in houses since it enables home energy control and monitoring. So, it is imperative to determine a HAN…
Read MoreA Model for Operationalizing the Information Technology Strategy Based on Structuration View
Many organisations adopt and implement information technology (IT) but fail to operationalise it. As a result, the process of implementation is continually repeated without achieving the goals and objectives, which are often to gain competitive advantage and sustainability. This study employs structuration theory as lens to examine and understand the factors that influence operationalisation of…
Read MoreFactors Influencing Social Knowledge Management in Social Society: A Systematic Literature Review
Knowledge is important now for the development of social society; it is necessary for knowledge management. Knowledge management (KM) aims to support the creation, transfer, and application of knowledge in social societies. This fact illustrates that in the management of social knowledge, the role of social communities is very important and is influenced by factors…
Read MoreUniversity Students Result Analysis and Prediction System by Decision Tree Algorithm
The main assets of universities are students. The performance of students plays a vital role in producing excellent graduate students who will be the future viable leader and manpower in charge of a country’s financial and societal progress. The purpose of this research is to develop a “University Students Result Analysis and Prediction System” that…
Read MorePerformance Effects of Algorithmic Elements in Selected MANETs Routing Protocols
Over time, several routing protocols have been suggested for use in Mobile Ad Hoc Networks (MANETs). Because of availability of so many MANETs routing protocols, network engineers and administrators face difficulties in identifying an appropriate routing protocol for a particular scenario. This challenge results from the unavailability of adequate technical analytic studies designed to examine…
Read MoreAnalysis of the Blockchain for Adoption in Electronic Commerce Management in Ecuador
The document describes the advancement of technology in commercial negotiations and functionality for various electronic transactions in Ecuador, with the aim of analyzing the blockchain and its adoption in managing e-commerce. The quantitative approach with a deductive and descriptive method has been used to identify the benefits in transactional activities and data security, both customers…
Read MoreFace Recognition on Low Resolution Face Image With TBE-CNN Architecture
Face recognition in low resolution images has challenges in active research because face recognition is usually implemented in high resolution images (HR). In general, research leads to a combination of pre-processing and training models. Therefore, this study aims to classify low-resolution face images using a combination of pre-processing and deep learning. In addition, this study…
Read More
