Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo cust...
详细信息
Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo customers. Since many customers were deceived, this case became quite popular. This study was executed to see how Indonesians felt about the Binomo application after the case went viral. The solution taken was in the form of sentiment analysis because there had been no previous research on sentiment analysis that discussed the Binomo case. The data was scanned using Netlytic tools, a cloud-based text and social network analyzer capable of identifying any talks on social media sites such as Twitter. The sentiment analysis of Binomo trading tweets by using the Multi-Perspective Question Answering lexicon utilized the KNIME tool. But unfortunately, the accuracy of sentiment analysis results is low. Furthermore, the Support Vector Machine technique is also being conducted. The Term Frequency-Inverse Document Frequency method is applied to perform feature extraction whilst the chi-square approach is utilized to identify features that are thought to be useful for inclusion in the classification process and to exclude features that are irrelevant to the target class. The obtained accuracy is 86%. The study proposes that words from the algorithm's outputs can be utilized to improve the quality of sentiment analysis using the lexicon. As an outcome of the algorithm, positive and negative terms are added to the lexicon, increasing the accuracy of sentiment analysis using the new vocabulary from 58.984% to 71.146%.
We present progress towards realizing electronic-photonic quantum systems on-chip;particularly, entangled photon-pair sources, placing them in the context of previous work, and outlining our vision for mass-producible...
详细信息
Silicon-based complementary metal oxide semiconductor (CMOS) process has become one of the most popular processes to realize system-on-chip (SoC). However, as one of the essential components of wireless SoC, antennas ...
Silicon-based complementary metal oxide semiconductor (CMOS) process has become one of the most popular processes to realize system-on-chip (SoC). However, as one of the essential components of wireless SoC, antennas are typically suffering from the poor radiation because of the highly conductive silicon substrate. Such antennas are known as antenna-on-chip (AoC). To enhance the radiation performance of AoC, artificial magnetic conductors (AMC) with double periodic strip structure layers has been proposed in this paper that can not only provide in-phase reflection but also isolate the antenna from the lossy silicon substrate. The proposed AMC shows a gain enhancement of 4.5 dB. The AMC-backed AoC is well-matched within 77-125 GHz and provides a boresight gain of 2 dBi at 94 GHz.
We have successfully demonstrated, for the first time, an innovative back-end-of-line (BEOL) compatible electro-optic modulator and memory (EOMM) based on Lithium Niobate on Insulator (LNOI) micro-ring resonator (MRR)...
Millimeter wave (mmWave) Device-to-Device (D2D) communication networks suffer high path loss and dynamic physical obstructions. Meanwhile, eavesdroppers can intercept confidential information by residing in the main o...
详细信息
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. This study explores IDOR vulnerabilities found within Android APIs, intending to clarify their inception while evaluating their implications for application security. This study combined the qualitative and quantitative approaches. Insights were obtained from an actual penetration test on an Android app into the primary reasons for IDOR vulnerabilities, underscoring insufficient input validation and weak authorization methods. We stress the frequent occurrence of IDOR vulnerabilities in the OWASP Top 10 API vulnerability list, highlighting the necessity to prioritize them in security evaluations. There are mitigation recommendations available for developers, which recognize its limitations involving a possibly small and homogeneous selection of tested Android applications, the testing environment that could cause some inaccuracies, and the impact of time constraints. Additionally, the study noted insufficient threat modeling and root cause analysis, affecting its generalizability and real-world relevance. However, comprehending and controlling IDOR dangers can enhance Android API security, protect user data, and bolster application resilience.
Quasi-isotropic antennas have gained attention due to the emergence of the Internet of Things (IoT) and Wireless Sensing Networks (WSNs), for their orientation-insensitive communication ability. For those applications...
Quasi-isotropic antennas have gained attention due to the emergence of the Internet of Things (IoT) and Wireless Sensing Networks (WSNs), for their orientation-insensitive communication ability. For those applications, electrically small (ES) antennas are usually preferred, which can save space for the IoT or sensing nodes, while reducing the material cost. Several compact isotropic antennas have been reported recently. However, only very few of them have shown dual-band operation ability. A novel design method to design a dual-band quasi-isotropic ES antenna is presented in this conference proceeding. The utilization of a band stop filter (BSF) enables the conventional single-band quasi-isotropic split ring resonator (SRR) antenna to behave in a dual-band operation, while maintaining the quasi-isotropic radiation for both bands. The proposed antenna is designed, fabricated, and measured, which shows a dual-band operation (both bands in ka<1 region) while maintaining decent performance.
In this work, we present a novel algorithm design methodology that finds the optimal algorithm as a function of inequalities. Specifically, we restrict convergence analyses of algorithms to use a prespecified subset o...
In this work, we present a novel algorithm design methodology that finds the optimal algorithm as a function of inequalities. Specifically, we restrict convergence analyses of algorithms to use a prespecified subset of inequalities, rather than utilizing all true inequalities, and find the optimal algorithm subject to this restriction. This methodology allows us to design algorithms with certain desired characteristics. As concrete demonstrations of this methodology, we find new state-of-the-art accelerated first-order gradient methods using randomized coordinate updates and backtracking line searches.
Surface electromyography (sEMG) recordings can be contaminated by electrocardiogram (ECG) signals when the monitored muscle is closed to the heart. Traditional signal processing-based approaches, such as high-pass fil...
详细信息
The use of high-penetration solar photovoltaics (PV) to transmission networks is complicated by voltage rise. Infractions of voltage occur when voltage levels surpass the permitted limits. Several solutions have been ...
The use of high-penetration solar photovoltaics (PV) to transmission networks is complicated by voltage rise. Infractions of voltage occur when voltage levels surpass the permitted limits. Several solutions have been suggested to avoid voltage breaches, including volt-VAR control on inverters. In this research, the impact of utilizing dynamic volt-VAR control as opposed to static volt-VAR control in a high-penetration photovoltaic (PV) system is compared to the impact of applying static VAR compensator (SVC). With dynamic volt-VAR control, which takes into account the inverter’s available reactive power capacity, it is possible to adjust the reactive power contribution of the PV inverter. The quantity of available capacity will affect the force of the control, as expressed by the droop gain. The transmission system’s controls are evaluated for one year to determine the number of uncompensated voltage occurrences. The number of violations that the control cannot compensate for affects how much reactive power the SVC must provide.
暂无评论