In this work, we investigate the compression capabilities of a photonic neuromorphic accelerator relying on an optical spectrum slicing technique [1], following a high-flow 1D imaging cytometry setup, able to image 62...
详细信息
Emotion is a psychosomatic process that is caused either by a conscious or non-conscious perception of an object or a situation whereas, the result of that process is depicted either by the expression of the face, or ...
详细信息
Application of mathematical models in a production environment is associated with solving many complex engineering and analytical problems, one of which is to evaluate the quality of such a model and assess the econom...
详细信息
Hate speech and abusive language on social media can spread massively and escalate into conflict between two or more individuals or parties. Previous studies about multi-label classification to identify whether the tw...
Hate speech and abusive language on social media can spread massively and escalate into conflict between two or more individuals or parties. Previous studies about multi-label classification to identify whether the tweet contains hate speech, abusive language, or not have been conducted with machine learning techniques. They applied machine learning with a combination of feature extraction and achieved a good result in recognizing the tweet with hate speech content. In this research, we apply two approaches: first, we use vanilla pre-trained models of IndoBERT, IndoBERTweet, and Indonesian RoBERTa; second, we combine the three previous models with CNN. Our experiment shows that our proposed method has better results compared to previous research with the best performance achieved by IndoBERTweet+CNN with 93.9% Accuracy.
In this work we combine a high flow cytometry experimental setup and a 10Kframe/sec capable neuromorphic event-based camera, followed by lightweight machine learning schemes, thus allowing the simultaneous imaging and...
详细信息
The rapid development of technology not only provides benefits that facilitate all human activities. However, it also encourages more security loopholes due to a person's lack of awareness in maintaining data secu...
The rapid development of technology not only provides benefits that facilitate all human activities. However, it also encourages more security loopholes due to a person's lack of awareness in maintaining data security. Phishing emails are one of the fastest growing security crimes and harm both businesses and individuals. This research aims to implement DMARC (Domain-based Message Authentication, Reporting, and Conformance) as an email authentication method that can monitor the security status of all types of messages that enter *** email domains. This research uses email phishing and spoofing as penetration testing techniques to analyze how good that email security method is. DMARC is implemented in three types of scenarios (none, quarantine, and reject) which manage to get different delivery rates and the success rate of DMARC work performance reaches 90% in monitoring and managing all email messages that go to the *** email domain. In the situation without policy enforcement, the DMARC system effectively observed a 100.0% external delivery rate during the phishing email delivery test. In the scenario where a quarantine policy was implemented, the DMARC system successfully monitored the external sending of phishing emails at a rate of 88.5%. Similarly, in the case of the reject policy scenario, DMARC effectively oversaw incoming phishing emails with an external delivery rate of 97.7%.
Effective programming of parallel architectures has always been a difficult t ask. T o d ate, programming languages and technologies have been developed that simplify the programmer's work, but do not make paralle...
详细信息
The popularity of smartphone devices has rapidly increased in recent years and many people utilize smartphones for various needs. The development of mobile applications has been aimed at various fields that make the d...
详细信息
Today's education system increasingly incorporates information technology, such as the use of computers, the internet, and mobile devices. Utilization of this information technology can facilitate the teaching and...
Today's education system increasingly incorporates information technology, such as the use of computers, the internet, and mobile devices. Utilization of this information technology can facilitate the teaching and learning process and increase the effectiveness, efficiency and productivity of users, both teachers, students and school administrators. However, given the growing number of users and the amount of data processed, school infrastructure often cannot meet these needs. The system development method will use the NDLC (Network Development Life Cycle) method which will be combined with the Tunnel Link Split to become a system that can be used remotely (remoting). The results of this research are that the results of designing and implementing cloud computing with the NDLC method combined with tunneling can be successful and used. Implementation is also carried out with additional monitoring using observium software and for access to the cloud using additional software, namely owncloud by obtaining an extended processor observium value of 99.90% (idle), detailed observium memory 69% (% of ram), swap storage observium 218.48kb/ s, observium ping response 86.4m/s, and observium traffic port wlo15.63m.
The evolution of cellular networks has played a pivotal role in shaping the modern telecommunications landscape. This paper explores the journey of cellular network generations, beginning with the introduction of Japa...
详细信息
暂无评论