The cyber-physical production system (CPPS) was developed for the interconnection between operational technology (OT) and information and communication technology (ICT) among the machines and decentralized production ...
详细信息
Nowadays mixing one language with another language either in spoken or written communication has become a common practice for bilingual speakers in daily conversation as well as in social media. Lexicon based approach...
详细信息
We present a high-accuracy 3D facial reconstruction system with the following features: real-time 3D facial reconstruction using exposure synchronization multi-camera, feature alignment to quantify facial differences,...
We present a high-accuracy 3D facial reconstruction system with the following features: real-time 3D facial reconstruction using exposure synchronization multi-camera, feature alignment to quantify facial differences, a software system based on a naked eye 3D display, and medical records for a 3D face database. The proposed system is novel and practical, and the algorithm and the hardware/software architecture improve the current non-quantitative communication status in medical aesthetics. The system achieves preoperative expectations, real-time recording and feedback during surgery, and postoperative tracking analysis, thus making doctor-patient communication more efficient. The facial data database records personal and quantitative beauty data and its changes, providing accurate medical and aesthetic treatment analysis for individuals. In addition, the collected data of different genders, ages, injection sites, and dosages contribute to the development of more accurate medical materials. With artificial intelligence and cloud architecture, we provide reliable data for medical aesthetics customers, helping them understand their medical aesthetic needs. Doctors also provide stable medical care quality to consumers through cloud data, and medical aesthetic consultants do not need to exaggerate medical effects excessively. They can inform customers of specific differences before and after surgery through precise data and provide visual communication and customer expansion to improve consultation conversion rates.
The rapid population growth and industrial development in developing countries harm the agricultural sector because many agricultural lands are converted into residential or industrial areas. Applying modern agricultu...
详细信息
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,...
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today, techniques that can automatically detect malware before it infects the system is required. This study aims to develop malware detection using machine learning approach with Principal Component Analysis (PCA) as feature reduction. PCA (Principal Component Analysis) is expected to be able to reduce the number of features which then could also reduce the learning time but do not reduce its accuracy significantly. There were four machine learning classifiers used in this study, i.e. K-Nearest Neighbor, Decision Tree, Naïve bayes, and Random Forest. The n-components used in this study were 20 and 34 and the ratio of test and train in the dataset was 35% for test and 65% for training. The results have shown that the best performance come from the detection using random forest with 34 n-component and 100 n-estimator with the average accuracy was 0.991688.
Typical video compression systems consist of two main modules: motion coding and residual coding. This general architecture is adopted by classical coding schemes (such as international standards H.265 and H.266) and ...
详细信息
Patent has been an increasingly important role in the world because it is not only significant to protect the invention of the company's business but also to generate revenue from the commercialization. WIPO (2018...
详细信息
Early detection of cardiac dysfunction through routine screening is vital for diagnosing cardiovascular diseases. An important metric of cardiac function is the left ventricular ejection fraction (EF), where lower EF ...
详细信息
Batik is an Indonesian world cultural heritage. Batik consists of many kinds of patterns depending on where the batik comes from, Batik-making techniques continue to develop along with technology development. Among th...
Batik is an Indonesian world cultural heritage. Batik consists of many kinds of patterns depending on where the batik comes from, Batik-making techniques continue to develop along with technology development. Among the batik making techniques that are widely used are hand-written, stamping, and printing. Batik motifs have been widely used as research material, especially in the field of artificial intelligence. The diverse appearance of batik motifs has attracted many researchers to carry out research on making synthetic batik patterns, one of which uses a Generative Adversarial Network. This paper presents a synthetic batik pattern model based on the Wasserstein Generative Adversarial Network with Gradient Penalty. This model has been proven to create new synthetic batik patterns quite well and almost identical with images provided in the dataset, with the notes if the dataset provided is large.
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of ne...
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of new attack types, it’s practically infeasible to persistently update attack patterns or signatures within security parameters. Key tools such as Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) are instrumental in monitoring network traffic and identifying potential threats. However, these tools face limitations, such as the high volume of alerts produced by IDS and the use of rule-based method, also the inability of SIEM tools to analyze logs comprehensively to identify inappropriate activities. This research has conducted anomaly detection using machine learning process to classify cyber-attacks network flow collected from IDS that installed incident network infrastructure. The analysis of IDS using machine learning, integrated with SIEM. The algorithm used in this research was Random Forest Classifier using CSE-CID-IDS2018 dataset pre-processed with Principal Component Analysis (PCA). Results of the experiments show that Random Forest Classifier Model, when combined with Principal Component Analysis (PCA), yields the most commendable results when applied to a 70/30 training/testing data ratio with accuracy of 0.99953.
暂无评论