—Machine learning has endless applications in the health care industry. White blood cell classification is one of the interesting and promising area of research. The classification of the white blood cells plays an i...
详细信息
As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AI-Generated Content (AIGC) emerges as a key solution, yet the resource-intensive nature of larg...
详细信息
As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AI-Generated Content (AIGC) emerges as a key solution, yet the resource-intensive nature of larg...
详细信息
This research raises problems among Baitul Mal aid recipients regarding aid to micro businesses. The process of assisting is an important activity to develop micro-businesses so that they can continue to operate and d...
This research raises problems among Baitul Mal aid recipients regarding aid to micro businesses. The process of assisting is an important activity to develop micro-businesses so that they can continue to operate and develop. Selection is also needed to prevent aid from being distributed incorrectly. Therefore, the proposed solution is to utilize data mining techniques, especially classification methods (clustering) to identify potential aid recipients who truly deserve to receive aid. This research also uses the Principal Component Analysis (PCA) method to reduce attribute dimensions in the dataset to increase the accuracy of the classification process. By optimizing the classification process through appropriate attribute reduction, this research is expected to make a positive contribution to increasing the efficiency and accuracy of credit risk assessment in the banking sector. The results of this research are: accuracy after the dataset has been reduced by 2 (two) attributes has a higher value when compared to the dataset that has not been reduced, this happens because the attribute reduction process is carried out to reduce attributes that are not or less relevant. So it can be said that the reduction process influences the accuracy of the C5.0 algorithm classification results.
Since the RSA algorithm is no longer secure and a lot of research has been done to break down RSA security, it is necessary to do research by making a combination of modifications of RSA algorithms, in this case using...
Since the RSA algorithm is no longer secure and a lot of research has been done to break down RSA security, it is necessary to do research by making a combination of modifications of RSA algorithms, in this case using enhanced RSA using fake modules, with RCCM (RC4 Chaotic Map) algorithms to produce a Hybrid Cryptosystem that is expected to be able to improve the security of secret messages. The combination process is done by encrypting the messages using the RCCM algorithm first, then the messages that have been encrypted back in the encryption using the enhanced RSA algorithm with fake modules. So the security of messages has been improved. As for the results of this study, the key generation process is automatically generated which produces keystream for RCCM and fake public key and fake private key for enhanced RSA. In addition, what distinguishes enhanced RSA from ordinary RSA is the use of four primes p, q, r, and s. as well as the application of chaotic maps to RCCM gives the advantage of the unnecessary use of generating keys manually. With these keys, the process of encryption and decryption can be carried out to generate a secret message. In addition, the program resulting from this research applies the kraitchik factorization algorithm as a medium of attack against the key. The conclusion of this study is that by doing a hybrid cryptosystem enhanced RSA and RCCM can be safer due to the occurrence of double encryption processes. In addition, an enhanced RSA algorithm determines a fake module where the value of X is a prime number so that if attacked using a kraitchik factorization algorithm it is difficult to find a factorization of X values that corresponds to the number of p, q, r, and s.
Facial image super-resolution is a crucial preprocessing for facial image analysis, face recognition, and image-based 3D face reconstruction. Convolutional neural networks were earlier used to produce high-resolution ...
详细信息
Mobile Wireless Sensor Network (MWSN) is an active network completely self-governing from a fixed structure. Also, MWSN has small channel bandwidth, great node movement, and inadequate battery energy. In WSN, flooding...
详细信息
Mobile Wireless Sensor Network (MWSN) is an active network completely self-governing from a fixed structure. Also, MWSN has small channel bandwidth, great node movement, and inadequate battery energy. In WSN, flooding raises the reliability regarding successful communication of a packet with greater overhead. The flooding consumes the network's resources quickly, especially in terms of the lifetime of the node and energy, etc. Unicast routing creates an extra overhead and increases energy consumption because unicast routing mainly focuses on only minimum distance. But, multicasting is used when the desired destination is at maximum distance and increases the network's reliability in terms of throughput. This paper's objectives are to develop an efficient and reliable protocol using multicasting and unicasting to overcome the issue of higher overhead due to flooding. Multicast Routing Technique for Augmenting (MRTA) routing efficiency in MWSN is introduced. This method aims to enhance the link stability of the route for raising the route lifetime and diminishing the routing load. This method discovers the stable path from several ways to decline the overhead and delay between the sender and receiver. Simulation results demonstrate that this approach improves the network lifetime increases the throughput, and minimizes the routing load in the MWSN.
In this paper, we introduce a kind of decomposition of a finite group called a uniform group factorization, as a generalization of exact factorizations of a finite group. A group G is said to admit a uniform group fac...
详细信息
The lowest time search in the dataset that E. Taillard utilized employs a heuristic approach based on tabu search techniques to get the predicted solution. Glover’s study gives a broad description of tabu search, whi...
The lowest time search in the dataset that E. Taillard utilized employs a heuristic approach based on tabu search techniques to get the predicted solution. Glover’s study gives a broad description of tabu search, which is commonly encountered in Taillard’s job shop scheduling difficulties and Widmer et al.’s flow shop sorting challenges. Although tabu search is relatively simple to use and typically yields excellent results, it takes a long time to complete. In this research a hybrid ACO and PSO was carried out to minimize makespan in the Job Shop Scheduling Problem which was used as sourced from benchmark data which is secondary data obtained from E. Taillard “Benchmarks for basic scheduling problems” which consists of job shop matrix data (job × machine) measuring 4 × 4, 5 × 5, 7 × 7, 10 × 10, 15 × 15, 20 × 20, 30 × 15, 30 × 20, 50 × 15 and 50 × 20. Hybrid is carried out by calculating the Pbest value, namely the process position of each job on the machine to get the best solution using the PSO algorithm. Next, calculate the Gbest (Global best) value for the position of each job on the best machine on the entire machine using the PSO algorithm and initialize the ACO parameters using the PBest and Gbest values. The results of research on datasets with sizes 10×10, 15×15, 20×20, 30×15, 30×20, 50×15 and 50×20 produce smaller makespan compared to the lower bound on the dataset with an average minimum makespan improvement value of 1.184.
The web continues to grow and attacks against the web continue to increase. This paper focuses on the literature review on scanning web vulnerabilities and solutions to mitigate web attacks. Vulnerability scanning met...
详细信息
暂无评论