Purpose-The purpose of this study is to provide the location of natural disasters that are poured into maps by extracting Twitter *** Twitter text is extracted by using named entity recognition(NER)with six classes hi...
详细信息
Purpose-The purpose of this study is to provide the location of natural disasters that are poured into maps by extracting Twitter *** Twitter text is extracted by using named entity recognition(NER)with six classes hierarchy location in ***,the tweet then is classified into eight classes of natural disasters using the support vector machine(SVM).Overall,the system is able to classify tweet and mapping the position of the content ***/methodology/approach-This research builds a model to map the geolocation of tweet data using *** research uses six classes of NER which is based on region *** data is then classified into eight classes of natural disasters using the ***-Experiment results demonstrate that the proposed NER with six special classes based on the regional level in Indonesia is able to map the location of the disaster based on data *** results also show good performance in geocoding such as match rate,match score and match ***,with SVM,this study can also classify tweet into eight classes of types of natural disasters specifically for the Indonesian region,which originate from the tweets *** limitations/implications-This study implements in Indonesia ***/value-(a)NER with six classes is used to create a location classification model with StanfordNER andArcGIS *** use of six location classes is based on the Indonesia regionalwhich has the large ***,it hasmany levels in its regional location,such as province,district/city,sub-district,village,road and place names.(b)SVMis used to classify natural *** of types of natural disasters is divided into eight:floods,earthquakes,landslides,tsunamis,hurricanes,forest fires,droughts and volcanic eruptions.
Stroke is becoming one of the most common diseases in modern society. Stroke caught in the early phase has a higher potential for recovery as it can be treated before the worsening of the patient's condition. Dete...
详细信息
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud...
详细信息
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned D...
详细信息
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ...
详细信息
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met...
详细信息
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi...
详细信息
Time series data is data that is collected periodically and has certain time intervals. Time series data is widely available in the fields of finance, meteorology, signal processing, health, and economics. Weather dat...
详细信息
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at...
详细信息
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca...
详细信息
暂无评论