There are numerous large-scale applications requiring mesh adaptivity, e.g., computational uid dynamics and weather prediction. Parallel processing is needed for simulations involving large-scale adaptive meshes. In t...
详细信息
Many scientific fields, including human gut microbiome science, collect multivariate count data where the sum of the counts is unrelated to the scale of the underlying system being measured (e.g., total microbial load...
详细信息
In this paper, we propose a cybersecurity exercise system in a virtual computer environment. The human resource development for security fields is an urgent issue because of the threat of cyber-attacks, recently, is i...
详细信息
ISBN:
(纸本)9781728126289
In this paper, we propose a cybersecurity exercise system in a virtual computer environment. The human resource development for security fields is an urgent issue because of the threat of cyber-attacks, recently, is increasing, many incidents occurring, but there is a not enough security personnel to respond. Some universities and companies are conducting education using a commercial training system on the market. However, built and operates the training system is expensive, therefore difficult to use in higher education institutions and SMEs. However, to build and operates, the training system needs high cost, thus difficult to use in higher education institutions and SMEs. For this reason, we developed the CyExec: a cybersecurity exercise system consisting of a virtual computer environment using VirtualBox and Docker. We also implemented the WebGoat that is an OSS vulnerability diagnosis and learning program on the CyExec and developed an attack and defense exercise program.
In this study conducted a Performance Analysis of the Combination of Fuzzy Analytic Hierarchy Process (FAHP) Algorithm with the Preference Ranking Organization Method for Enrichment Evaluation algorithm (PROMETHEE II)...
In this study conducted a Performance Analysis of the Combination of Fuzzy Analytic Hierarchy Process (FAHP) Algorithm with the Preference Ranking Organization Method for Enrichment Evaluation algorithm (PROMETHEE II) in the ranking process to determine the increase in employee groups. From the results of the experiment the Performance Analysis of Fuzzy Analytic Hierarchy Process (FAHP) Algorithm with the Preference Ranking Organization Method for Enrichment Evaluation algorithm (PROMETHEE II) in the ranking process to determine the increase in the employee class obtained by the average employee considered at 62.31%. Seeing the percentage value considered with the Promethee algorithm (45.33%) lower than the Fuzzy AHP algorithm (79.30%), it can be said that the Combination Fuzzy AHP algorithm with Promethee is more selective in the weighting and ranking process.
Big data transfer in next-generation scientific applications is now commonly carried out over dedicated channels in high-performance networks (HPNs), where transport protocols play a critical role in maximizing applic...
详细信息
It is a hard job for two teachers to deal with 30 students in a preschool classroom in Taiwan. Teachers need to take photos and manage paper documents related to each student's activities and assessments, then pri...
详细信息
This paper intended to classify land cover of high-resolution satellite image using supervised classification method. The object of this research was the land cover image of the central Java area in Indonesia which ch...
详细信息
Back propagation is one of the supervised learning and multi-layered training program and uses errors during the process of changing the weight value in the backward process as well as the forward propagation. In the ...
Back propagation is one of the supervised learning and multi-layered training program and uses errors during the process of changing the weight value in the backward process as well as the forward propagation. In the method for predicting cognitive abilities backpropagation the first step is to set the input neuron number, the number of neurons that are hidden, and the number of output neurons. The number of neurons used in the program is 6 neurons consisting of cognitive criteria, 6 hidden neuron layers, and 2 neuron outputs. The highest level of accuracy is in the binary sigmoid and bipolar sigmoid activation functions at the 64th epoch with the accuracy of each function of 82.93% +/- 37.63% and 85.37% +/- 35.34%. The smallest root mean squared error value was found in binary sigmoid of 0.266 with a tolerance of +/- 0.258 on the 100th epoch with an accuracy of 80.49% while for the sigmoid bipolar activation function the smallest root mean squared error value was obtained at the epoch 500 of 0.282 with tolerance +/- 0.353.
Naïve Bayes is a prediction method that contains a simple probabilistic that is based on the application of the Bayes theorem (Bayes rule) with the assumption that the dependence is strong. K-Nearest Neighbor (K-...
Naïve Bayes is a prediction method that contains a simple probabilistic that is based on the application of the Bayes theorem (Bayes rule) with the assumption that the dependence is strong. K-Nearest Neighbor (K-NN) is a group of instance-based learning, K-NN is also a lazy learning technique by searching groups of k objects in training data that are closest (similar) to objects on new data or testing data. Classification is a technique in Data mining to form a model from a predetermined data set. Data mining techniques are the choices that can be overcome in solving this problem. The results of the two different classification algorithms result in the discovery of better and more efficient algorithms for future use. It is recommended to use different datasets to analyze comparisons of naïve bayes and K-NN algorithms. the writer formulates the problem so that the research becomes more directed. The formulation of the problem in this study is to find the value of accuracy in the Naïve Bayes and KNN algorithms in classifying data.
Every human has a face pattern and certain characteristics even though identical twins, but the human face pattern still has its own distinctiveness as well as old face patterns and young face patterns even though the...
Every human has a face pattern and certain characteristics even though identical twins, but the human face pattern still has its own distinctiveness as well as old face patterns and young face patterns even though the human face pattern is very diverse but for young and old face patterns will be a difference between one face and the other face. Face detection (face detection) is one of the initial stages that very important in face recognition that is used in biometric identification. Face detection can also be used to search or index face data from images or videos that contain faces of various sizes, positions, and backgrounds. Face detection (face detection) automatically with the help of a computer is a problem that is not easy because the human face has a high level of variability both intra-personal and extra-personal variability. This study shows that systems with template matching methods combined with FAM can successfully detect differences in human faces, 80% accuracy, 10% better by using ordinary template matching.
暂无评论