Purpose-The purpose of this study is to provide the location of natural disasters that are poured into maps by extracting Twitter *** Twitter text is extracted by using named entity recognition(NER)with six classes hi...
详细信息
Purpose-The purpose of this study is to provide the location of natural disasters that are poured into maps by extracting Twitter *** Twitter text is extracted by using named entity recognition(NER)with six classes hierarchy location in ***,the tweet then is classified into eight classes of natural disasters using the support vector machine(SVM).Overall,the system is able to classify tweet and mapping the position of the content ***/methodology/approach-This research builds a model to map the geolocation of tweet data using *** research uses six classes of NER which is based on region *** data is then classified into eight classes of natural disasters using the ***-Experiment results demonstrate that the proposed NER with six special classes based on the regional level in Indonesia is able to map the location of the disaster based on data *** results also show good performance in geocoding such as match rate,match score and match ***,with SVM,this study can also classify tweet into eight classes of types of natural disasters specifically for the Indonesian region,which originate from the tweets *** limitations/implications-This study implements in Indonesia ***/value-(a)NER with six classes is used to create a location classification model with StanfordNER andArcGIS *** use of six location classes is based on the Indonesia regionalwhich has the large ***,it hasmany levels in its regional location,such as province,district/city,sub-district,village,road and place names.(b)SVMis used to classify natural *** of types of natural disasters is divided into eight:floods,earthquakes,landslides,tsunamis,hurricanes,forest fires,droughts and volcanic eruptions.
Stroke is becoming one of the most common diseases in modern society. Stroke caught in the early phase has a higher potential for recovery as it can be treated before the worsening of the patient's condition. Dete...
详细信息
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud...
详细信息
Visible light communications (VLC) enable wireless data transmission using existing light-emitting diode (LED) illumination. This experimental study evaluates the performance of multiple input and multiple output (MIM...
详细信息
The exponential growth of the number of devices connected to the Internet and the use of IoT applications increases the amount of data exchange over public channels in low-cost and low-power embedded systems. Images a...
详细信息
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned D...
详细信息
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ...
详细信息
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at...
详细信息
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca...
详细信息
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal...
详细信息
暂无评论