Results (15)
Search Parameters:
Keyword: ConfusionChaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map Diffusion
This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images. The encryption and decryption process of this system is done on the client side using chaos-based encryption with confusion and diffusion techniques. Arnold’s cat map is the chaotic map model used for confusion, while the…
Read MoreDesign and Implementation of an Automated Medicinal-Pill Dispenser with Wireless and Cellular Connectivity
Medical adherence is a major concern globally and is increasing with improved access to medication. Unfortunately, patients taking multiple medications often struggle with confusion about when and how to take each medication. To address this issue, an inexpensive domestic device has been proposed to improve medication adherence. This device uses Wi-Fi and cellular Internet of…
Read MoreRedesign and Improvement in the Management of the Raw Material Inventory Control Process with Oracle APEX
Having reasonable inventory control is a priority for any company because a lack of inventory could incur economic losses. Not having the necessary stock for the timely production of your orders could generate dissatisfaction in your customers and possibly cause them to lose them. Likewise, reasonable inventory control allows quick decision-making for the company’s benefit.…
Read MoreOptimized Component based Selection using LSTM Model by Integrating Hybrid MVO-PSO Soft Computing Technique
Research focused on training and testing of dataset after Optimizing Software Component with the help of deep neural network mechanism. Optimized components are selected for training and testing to improve the accuracy at the time of software selection. Selected components are required to be attuned and accommodating as per requirement. Soft computing mechanism such as…
Read MoreSensitivity Analysis of Data Normalization Techniques in Social Assistance Program Decision Making for Online Learning
Data sensitivity analysis using normalization techniques in decision making has an impact on preference values and rankings in the case of social assistance programs for student online. The distribution of assistance is disproportionate and not on target to potential recipients. This study aims to analyze data sensitivity from simple data normalization techniques and linear techniques…
Read MoreTolerance of Characteristics and Attributes in Developing Student’s Academic Achievements
The purpose of this research is to study the relevance of factors for the analysis of the effectiveness of suitable educational institutions that illustrate the significance of the characteristics and attributes of the student’s academic achievements and to identify the acceptance and tolerance of each attribute, which supports lifelong learning. The data used in this…
Read MoreNature Inspired and Transform Based Image Encryption Techniques: A Comparative Study
In this paper, performances of two variations of chaos based algorithms are compared. First algorithm is a self-adaptive color image encryption algorithm is proposed based on Radial Hilbert Transform and chaos. This technique uses chaotic random phase masks operated on the transformed pixels to increase the randomness in confusion and diffusion operations. Also, a random…
Read MoreClustering of Mindset towards Self-Regulated Learning of Undergraduate Students at the University of Phayao
The effects of Covid-19 severely affected the Thai higher education model. Therefore, there are three significant objectives in this research: (1) to cluster the mindsets and attitudes toward self-regulated learning styles of undergraduate students at the University of Phayao. (2) to construct a predictive model for recommending an appropriate student learning clusters. (3) to evaluate…
Read MoreFraud Detection Call Detail Record Using Machine Learning in Telecommunications Company
Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…
Read MoreSentiment Analysis of Transjakarta Based on Twitter using Convolutional Neural Network
TransJakarta is one of the methods to reduce congestion in Jakarta. However, the number of TransJakarta users compared to number of private vehicle users is very small, only 24% of the total population in Jakarta. The purpose of this research is to know public opinions about TransJakarta whether positive or negative by doing sentiment analysis…
Read MoreDevelopment of Tactile Display and an Efficient Approach to Enhance Perceptual Analysis in Rehabilitation
Tactile displays are widely used in the rehabilitation and education of blind persons, as it is one of the media of communication amongst them. Tactile display performance is measured in terms of accuracy in presenting pattern, accuracy in identification, recognition and reading time of presented pattern. However, it has had meager attention from researchers. This…
Read MoreSentiment Analysis on Twitter for Predicting Stock Exchange Movement
This paper is proposed to build a model by applying two methods, namely support vector machine and nonnegative matrix factorization in the process of predicting stock market movement using twitter and historical data. The stock exchange is based on the LQ 45 stock with period from August 2018 – January 2019. The features consist of…
Read MoreAmplitude-Frequency Analysis of Emotional Speech Using Transfer Learning and Classification of Spectrogram Images
Automatic speech emotion recognition (SER) techniques based on acoustic analysis show high confusion between certain emotional categories. This study used an indirect approach to provide insights into the amplitude-frequency characteristics of different emotions in order to support the development of future, more efficiently differentiating SER methods. The analysis was carried out by transforming short 1-second…
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read MorePixel-Based Unsupervised Classification Approach for Information Detection on Optical Markup Recognition Sheet
This paper proposed an Optical Markup Recognition (OMR) system to be used to detect shaded options of students after MCQ-type examinations. The designed system employed the pixel-based unsupervised classification approach with image pre-processing strategies and compared its efficiencies, in terms of speed and accuracy, with object-based supervised or unsupervised classification OMR systems. Speed and accuracy…
Read More
