Data mining is a technique of extracting information that has not been known before in a collection of data in the database. Data mining has been applied in various fields that require extracting information, some of ...
详细信息
Artificial Intelligence (AI) seems to be a disruptive technology that defines and reshapes the economy, more efficient industrial processes, new business models, and the service sector, becoming the development of dif...
详细信息
Citrus Limon L. (Lemon) is a type of fruit that is currently widely consumed, because it contains abundant vitamin C, fiber, and antioxidants. This fruit have high potential in the agribusiness sector and is widely cu...
Citrus Limon L. (Lemon) is a type of fruit that is currently widely consumed, because it contains abundant vitamin C, fiber, and antioxidants. This fruit have high potential in the agribusiness sector and is widely cultivated by traditional farmers. However, during harvest time, traditional farmers generally still use manual methods using the human eye in distinguishing the maturity level of lemons which is less efficient because it has a low accuracy. Digital image processing is one solution to this problem. In the research on the classification of lemon maturity levels using digital image processing with the feature extraction method of the Mean RGB, HSV, and LBP methods and the K-Nearest Neighbor classification algorithm in this study, a total of 120 lemon images were used which were divided into 80 training image data and 40 image data. testing. The results of model performance measurements in the form of the highest accuracy level in the Mean RGB method of 100%, the highest accuracy in the HSV method of 98%, and the highest accuracy in the LBP method of 82.5%.
The integration of Internet of Things (IoT) technologies into modern homes has enhanced safety and comfort, particularly in detecting gas leaks, which pose serious fire hazards. Gas leaks can often be detected by smel...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
The integration of Internet of Things (IoT) technologies into modern homes has enhanced safety and comfort, particularly in detecting gas leaks, which pose serious fire hazards. Gas leaks can often be detected by smell, but this method fails when no one is present. Previous research using microcontrollers and sensors to detect gas leaks faced challenges with accuracy due to noise interference. This paper proposes the use of a Kalman filter, developed by Rudolf Emil Kalman in 1960, to improve gas leak detection accuracy by filtering out noise. The system comprises an Arduino Nano, ESP8266 WiFi module, MQ-2 gas sensor, buzzer, and ThingSpeak cloud platform. By applying the Kalman filter, noise and data oscillations are reduced, enhancing detection accuracy. Experimental results show the system effectively detects gas leaks, provides real-time data, and triggers alarms. Future improvements could include additional sensors and features to further increase the system’s reliability and functionality.
Stunting in toddlers is a chronic nutritional issue that affects the physical and cognitive development of children, with serious long-term consequences such as reduced cognitive function and an increased risk of chro...
详细信息
ISBN:
(数字)9798350379839
ISBN:
(纸本)9798350379846
Stunting in toddlers is a chronic nutritional issue that affects the physical and cognitive development of children, with serious long-term consequences such as reduced cognitive function and an increased risk of chronic diseases in adulthood. Therefore, early identification and prevention efforts for stunting are crucial. Classifying toddlers into categories of at-risk for stunting or not is essential to provide timely and appropriate interventions. This study employs data mining techniques using the decision tree algorithm to expedite the stunting detection process and improve the accuracy of nutritional status classification in children. The results indicate that the constructed decision tree model can classify children's nutritional status with an accuracy of 83.26%. The decision tree achieves high accuracy in classifying stunting in toddlers due to its ability to handle complex data and identify significant patterns within the data.
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. This study explores IDOR vulnerabilities found within Android APIs, intending to clarify their inception while evaluating their implications for application security. This study combined the qualitative and quantitative approaches. Insights were obtained from an actual penetration test on an Android app into the primary reasons for IDOR vulnerabilities, underscoring insufficient input validation and weak authorization methods. We stress the frequent occurrence of IDOR vulnerabilities in the OWASP Top 10 API vulnerability list, highlighting the necessity to prioritize them in security evaluations. There are mitigation recommendations available for developers, which recognize its limitations involving a possibly small and homogeneous selection of tested Android applications, the testing environment that could cause some inaccuracies, and the impact of time constraints. Additionally, the study noted insufficient threat modeling and root cause analysis, affecting its generalizability and real-world relevance. However, comprehending and controlling IDOR dangers can enhance Android API security, protect user data, and bolster application resilience.
Border and Inland areas are often faced with communication problems due to limited infrastructure and extreme geographical conditions. This research has produced three APRS-based communication system devices in border...
详细信息
ISBN:
(数字)9798331542016
ISBN:
(纸本)9798331542023
Border and Inland areas are often faced with communication problems due to limited infrastructure and extreme geographical conditions. This research has produced three APRS-based communication system devices in border and inland areas that can be used to report emergency positions, namely Tracker, Digipeater, and Internet Gateway (IGate). Two APRS testing scenarios were conducted, namely sending beacons from Tracker and Ground Station, and sending beacons from Tracker, Digipeater, and Ground Station. The first scenario test results recorded a maximum distance of 2.36 kilometers (straight line) for sending and receiving information. Meanwhile, the second scenario test results can send and receive information with a maximum distance of 4.21 kilometers (straight line). This result confirms that the range of sending information signals using the digipeater device can expand the range of receiving information up to two times. Based on these results, the second scenario between Tracker, Digipeater, and Ground Station is more effectively used to increase communication coverage in border and inland areas.
Production losses of agricultural commodities on agricultural land due to product defects depend on the level of pest and disease attacks. Defects cause the product not to be harvested or rejected by the market. Data ...
详细信息
Education about health sciences has historically been limited in the curriculum of health professionals and largely inaccessible to the public. In practice, most of the health science education is still running conven...
详细信息
Education about health sciences has historically been limited in the curriculum of health professionals and largely inaccessible to the public. In practice, most of the health science education is still running conventionally. Supposedly with the advancement of technology and the use of the internet everywhere, learning such as e-learning can be important, especially in the health sector. Until this research was conducted, only 514 academic documents about e-learning in health sciences were found for 20 years from 2001 to 2020, obtained in searching on the Scopus database. This study presents a comprehensive overview of studies related to E-learning in the Health sciences sector. This study uses bibliometric analysis and indexed digital methods to map scientific publications throughout the world. This research employs the Scopus database to gather information, as well as the Scopus online analysis tool and Vosviewer to show the bibliometric network. The method consists with five stages: determining search keywords, initial search results, refinement of search results, initial compilation, and data analysis. Among the most published and indexed articles by Scopus, papers published by researchers in the United States have the highest number of publications (80), followed by United Kingdom (63) and Australia with 45 academic publications. The processed data shows the pattern and trend of increasing the number of international publications in E-learning in Health sciences field, which Scopus index.
Fuzzy logic can be used to represent obscurity based on terms such as high, old, hot, cold, and so on. Fuzzy logic can extend the range of truth values to all real numbers in intervals between 0 and 1. Numbers in this...
详细信息
暂无评论