Ontology embeddings map classes, relations, and individuals in ontologies into Rn, and within Rn similarity between entities can be computed or new axioms inferred. For ontologies in the Description Logic EL++, severa...
详细信息
IoT technologies can facilitate machine-to-machine as well as human-to-machine interactions. Use of an automotive human-machine interface can help in exchanging information between vehicles and passengers or drivers. ...
详细信息
Network security is a crucial component of Information technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of ne...
Network security is a crucial component of Information technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of new attack types, it’s practically infeasible to persistently update attack patterns or signatures within security parameters. Key tools such as Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) are instrumental in monitoring network traffic and identifying potential threats. However, these tools face limitations, such as the high volume of alerts produced by IDS and the use of rule-based method, also the inability of SIEM tools to analyze logs comprehensively to identify inappropriate activities. This research has conducted anomaly detection using machine learning process to classify cyber-attacks network flow collected from IDS that installed incident network infrastructure. The analysis of IDS using machine learning, integrated with SIEM. The algorithm used in this research was Random Forest Classifier using CSE-CID-IDS2018 dataset pre-processed with Principal Component Analysis (PCA). Results of the experiments show that Random Forest Classifier Model, when combined with Principal Component Analysis (PCA), yields the most commendable results when applied to a 70/30 training/testing data ratio with accuracy of 0.99953.
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with...
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with a pair of audiovisual transmission and reception terminals and a pair of interference traffic transmission and reception ones. We investigate the effect of the transmission rate of interference traffic and communication distance in a wireless channel on the output quality of the video and audio stream at the reception terminal. We perform a subjective experiment with the output timing of video and audio obtained by the simulation.
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the M...
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the MVV-A system with MPEG-DASH. We conduct a subjective experiment changing available network bandwidth and investigate the effect of the methods on QoE.
Technological advancements are accelerating in the modern day;one such advancement is augmented reality (AR) technology. Naturally, these advancements have an effect on various sectors of life, one of which is educati...
详细信息
Currently, online Shopping platforms have grown significantly, especially during the COVID-19 pandemic. This condition motivates the need for analyzing how the users/customers’ opinions on using such platform. Sentim...
Currently, online Shopping platforms have grown significantly, especially during the COVID-19 pandemic. This condition motivates the need for analyzing how the users/customers’ opinions on using such platform. Sentiment analysis, as a process of detecting, extracting, and classifying users’ opinions and attitudes toward specific topics, is a good tool for the required analysis. This study aims to evaluate the performance of machine learning approach which combined with N-Gram technique in doing sentiment analysis. The dataset used in this study comes from scraping reviews in Bahasa Indonesia regarding the Shopee Apps. In this study, $\mathrm{N}=2$ for the N-Gram was employed in the preprocessing process. Our main goal is to investigate whether the performance of machine learning in doing sentiment analysis can be improved by adding the N-Gram technique in its preprocessing. This work applied the Naive Bayes Classifier and k-Nearest Neighbor with $K=11$ as the machine learning algorithms. The best accuracy in this study was achieved by Naive Bayes Classifier after applying N-Gram Terms $(N=2)$ with Split Validation (8:2), which is $\mathbf{97.26\%}$.
A microwave kiln, made of silicon carbide and ceramic fiber, commonly employs in a household glassware production process. In this process, when the kiln was in a microwave oven, a microwave transmitted to the kiln ge...
详细信息
the learning algorithm that is not optimal is due to the incomplete use of quantum in the perceptron quantum learning algorithm which is the background of this research. Previous research has shown that the proposed a...
详细信息
暂无评论