Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 453 - 471
Published: Jan. 1, 2024
Language: Английский
Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 453 - 471
Published: Jan. 1, 2024
Language: Английский
Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108207 - 108207
Published: June 30, 2022
Language: Английский
Citations
25International Journal of Advanced Computer Science and Applications, Journal Year: 2022, Volume and Issue: 13(6)
Published: Jan. 1, 2022
Along with the development of Covid-19 pandemic, many responses and news were shared through social media. The new vaccination promoted by government has raised pros cons from public. Public resistance to covid-19 will lead a higher fatality rate. This study carried out sentiment analysis about vaccine using Support Vector Machine (SVM). research aims public response acceptance program. result can be used determine direction policy. Data collection was taken via Twitter in year 2021. data then undergoes preprocessing methods. Afterward, is processed SVM classification. Finally, evaluated confusion matrix. experimental shows that produces 56.80% positive, 33.75% neutral, 9.45% negative. highest model accuracy obtained RBF kernel 92%, linear polynomial kernels 90% accuracy, sigmoid 89% accuracy.
Language: Английский
Citations
242022 5th International Conference on Information and Communications Technology (ICOIACT), Journal Year: 2022, Volume and Issue: unknown, P. 30 - 35
Published: Aug. 24, 2022
The Internet of Everything (IoE) connects millions machines, vehicles, nodes, smoke detectors, watches, glasses, webcams, and other devices to the internet. These entities need proper guidance control for expected performance. There is always a manage their networks better performance properly. However, managing all these not easy; it big concern. All types network architectures are getting enhanced daily, traditional management process becomes more complex, especially rendering during technology entity modifications. Software-Defined Networking (SDN) extensively used in networks, future technologies (IoT, IoV, 6G, AI, etc.) tackle such concerns issues. as with any new phrase or paradigm, no clear description this has emerged yet, which will give complete understanding SDN, from basic terminology its capabilities. contribution research article significant step forward basics SDN. This proposes detailed review SDN form history, overview, architecture, benefits, services, trends, application, features, challenges.
Language: Английский
Citations
20International Journal of Cognitive Computing in Engineering, Journal Year: 2024, Volume and Issue: 5, P. 78 - 87
Published: Jan. 1, 2024
Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care patients remotely. The use telemedicine has seen significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable technology, and potential misdiagnosis without physical examination. Digital Watermarking can assist addressing issues by incorporating unique identifier into image be used authenticate its validity. To tackle these issues, this study proposes robust digital watermarking approach tailored brain images, combining hashing, Elliptic Curve Signature Algorithm (ECDSA), Integer Wavelet Transform-Discrete Cosine Transform (IWT-DCT). This method utilizes Secure Hash (SHA-256) first segment brain's Region Interest (RoI). Subsequently, hashed RoI, along with an ECDSA signature, embedded high-frequency sub-bands using IWT-DCT. embedding process strategically alters coefficients accommodate signature while minimizing perceptual distortion. technique leverages robustness transformed-domain techniques against various attacks combines it SHA-256 integrity authentication purposes. results demonstrate suggested variety processing techniques, including noise addition, filtering, compression maintaining high levels imperceptibility. Key metrics Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), Structural Similarity Index (SSIM) were evaluate performance. strategy exhibited substantial improvement over existing methods. PSNR increased 68.67, indicating higher quality, MSE reduced 0.96, demonstrating closer pixel values original image. Moreover, SSIM reached 0.98, denoting nearly perfect resemblance between watermarked images. also demonstrated quick extraction speeds, well tamper detection capabilities.
Language: Английский
Citations
4International Journal of Advanced Computer Science and Applications, Journal Year: 2022, Volume and Issue: 13(8)
Published: Jan. 1, 2022
Tracer Study is a mandatory aspect of accreditation assessment in Indonesia. The Indonesian Ministry Education requires all Indonesia Universities to anually report graduate tracer study reports the government. also needed by University evaluating success learning that has been applied curriculum. One things need be evaluated level absorption graduates into working industry, so machine model assist Officials and understanding character its graduates, it can help determine curriculum policies. In this research, researcher focuses on making reliable with dataset format determined Government was obtained from Amikom University. study, SVM will tested several variants algorithm handle imbalanced data. compared SMOTE, SMOTE-ENN, SMOTE-Tomek combined detect employability graduates. test carried out K-Fold Cross Validation, highest accuracy precision results produced SMOTE-ENN value 0.96 0.89.
Language: Английский
Citations
13Expert Systems with Applications, Journal Year: 2024, Volume and Issue: 249, P. 123486 - 123486
Published: Feb. 14, 2024
Language: Английский
Citations
22022 5th International Conference on Information and Communications Technology (ICOIACT), Journal Year: 2022, Volume and Issue: unknown, P. 116 - 121
Published: Aug. 24, 2022
The important process in wastewater treatment is the removal of pollutants, and dataset having so many features may cause difficulty training data predicting key variables. This work aims to propose set parameters through normalization techniques, feature selection AI techniques. datasets have 36 a parameter, experimental contain 628. Constant factor, Z-score, Min-max are techniques used normalize petrochemical dataset. SelectKBest, ExtraTreeClassifier, PCA, RFE for mining. Then finally done with implementation help supervised neural network technique called backpropagation (BPNN).
Language: Английский
Citations
92022 5th International Conference on Information and Communications Technology (ICOIACT), Journal Year: 2022, Volume and Issue: unknown, P. 188 - 193
Published: Aug. 24, 2022
The growth of internet users in Indonesia experiences a very high increase every year, with the also resulting many people using social media. Sestyc is media application created by group millennial children Indonesia. This study was conducted to analyze sentiment text data form review obtained from Google Play Store. purpose this research towards sestyc and find best algorithm for classifying sentiment. used analyzing consists Support Vector Machine, Logistic regression, Naive Bayes. results class labeling on 8000 reviews total 4719 positive 3281 negative reviews. indicate that Machine has highest accuracy value compared other algorithms, where gets an value. 87.81%.
Language: Английский
Citations
9Journal of King Saud University - Computer and Information Sciences, Journal Year: 2023, Volume and Issue: 35(9), P. 101755 - 101755
Published: Sept. 15, 2023
This paper proposes a new block mapping technique for image authentication and self-recovery designed to avoid the tamper coincidence problem called AuSR3. The can arise when modifications an affect original its recovery data, resulting in inability recover tampered region of image. ensures that data is embedded into most distant location possible, minimizing problem. In addition, improved LSB shifting algorithm employed embed watermark consisting data. experimental result shows AuSR3 produce high-quality watermarked images across various datasets with average PSNR values 46.2 dB, which by 2.1 dB compared replacement technique. avoids up 25% tampering rates. It contributes recovered SSIM value 39.10 0.9944, respectively, on 10% rate USC-SIPI dataset.
Language: Английский
Citations
5International Journal of Advanced Computer Science and Applications, Journal Year: 2022, Volume and Issue: 13(7)
Published: Jan. 1, 2022
This paper proposes a blind and robust image watermarking technique using Discrete Cosine Transform (DCT) for copyright protection on color images called BRIW-DCT. Each channel of the host is divided into non-overlapping blocks with size 8×8 pixels. block transformed frequency domain DCT transformation. The watermark embedded by modifying 11th to 15th coefficient. experimental result shows that watermarked achieved high PSNR value 50.4489 dB SSIM 0.9991. Furthermore, various attacks are performed image. BRIW-DCT can successfully recover from tampered image, which produces NC 0.7805 low BER 0.1126.
Language: Английский
Citations
8