The need for early detection of diabetes mellitus has led to the development of various intelligent systems using machine learning and artificial intelligence for the recognition of the presence of the disease. Howeve...
详细信息
The need for early detection of diabetes mellitus has led to the development of various intelligent systems using machine learning and artificial intelligence for the recognition of the presence of the disease. However, most of the techniques have yielded a comparatively lower accuracy. This research applied data science techniques to a dataset of diabetes mellitus to improve the accuracy of the prediction of the disease. This was achieved by pre-processing the data with dummy categories and applying principal components analysis for reduced dimensionality. Support vector machine, random forest classifier, and deep neural networks were then used to train the system. Support vector machine, random forest classifier, and deep neural networks yielded accuracies of 0.76, 0.77, and 0.89 respectively. Correspondingly, deep neural networks yielded the highest accuracy. The study concluded that better pre-processing will improve the accuracy of machine learning algorithms in the prediction of diabetes mellitus.
We consider the use of a domain proxy assisted private citizen broadband radio service (CBRS) network and propose a Maximum Transmission Continuity (MTC) scheme to transmit Internet of Things (IoT) data reliably. MTC ...
详细信息
Segmentation plays a crucial role in computer-aided medical image diagnosis, as it enables the models to focus on the region of interest (ROI) and improve classification performance. However, medical image datasets of...
详细信息
The electrically evoked compound action potential (ECAP) has been used in various clinical studies and has become a key physiological signal for cochlear implants (CI). This study used four sensing electrodes to recor...
详细信息
ISBN:
(数字)9798350348958
ISBN:
(纸本)9798350348965
The electrically evoked compound action potential (ECAP) has been used in various clinical studies and has become a key physiological signal for cochlear implants (CI). This study used four sensing electrodes to record ECAP signals based on the alternating polarity approach. An electrical field imaging (EFI) result based on the finite element method was used to obtain the interface impedance, then ECAP simulation results were computed and compared with a patient's clinical ECAP measurements. Preliminary modeling results show that the interface impedance obtained by this EFI-based technique can improve the simulation accuracy of the ECAP model. The ECAP modeling result will be compared with clinical ECAP measurements to validate the model in the full paper.
In our study, we explore methods for detecting unwanted content lurking in visual datasets. We provide a theoretical analysis demonstrating that a model capable of successfully partitioning visual data can be obtained...
详细信息
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a singl...
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a single key to encrypt and decrypt information. This study uses Fernet and RSA which is the combination of symmetric and asymmetric encryption called hybrid encryption. In addition, the cipher text will be hidden inside an image using Stepic. Hybrid Encryption uses asymmetric encryption to encrypt the symmetric encryption secret key, it will secure the symmetric encryption. The result of this study is the lowest error that we got as the MSE is 0.00% and is inversely proportional with the Peak Signal to Noise Ratio (PSNR) and Avalanche (AVA) with 79.00% and 42.34% in order. Inversely proportional to the length of the text that is hidden in the image, the longest text that is hidden, the more changes that we get in the image with the highest Unified Average Changing Intensity (UACI) and Number of Pixels Change Rate (NPCR) with the biggest image size with 46.48% for UACI and 99.86% for the NPCR.
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been know...
详细信息
ISBN:
(数字)9781665471039
ISBN:
(纸本)9781665471046
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been known as a generic cache decision policy. However, because LCE caches at all the intermediate nodes, the cache of intermediate nodes can be duplicated. Therefore, various cache decision policies that eliminate redundancy have been proposed. In this paper, we evaluate the effect of the cache decision policies on QoE of video and audio transmission in ICN/CCN. We assess application-level QoS using a computer simulation with a tree network and QoE by means of subjective experiment.
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of ...
详细信息
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of new technology to quickly perpetrate fraud against customer transaction patterns. We analyze credit card transaction networks and identify suspicious patterns, such as transactions connected to multiple accounts or unusual transaction patterns, transactions made at unusual times, and to monitor credit card transactions in real-time and quickly identify suspicious transactions. TigerGraph is used to analyze data, display results on a dashboard, and send notifications via email. One meth’\ Vc 1``13-od commonly used in anomaly detection is to compare data values against the standard deviation. In this research, we explain the use of TigerGraph as a platform for anomaly detection above the standard deviation, as well as the use of the Louvain algorithm in finding merchant communities used by fraudsters. The data used in this study comes from Sparkov simulation data obtained from Kaggle. Our results show that by using TigerGraph, we managed to achieve a very high accuracy rate of 99.77%, precision 82.84%, recall 72.38%, and f1-score 77,26% in predicting transaction fraud on Sparkov simulation data. This is much better than the results reported in a paper that uses the supervised machine learning method with the AdaBoost algorithm which achieves the highest accuracy of 77%.
The final decision of the educational assistance recipient in GNOTA Foundation, Jakarta is still processed manually. They usually only look at the father's occupation criteria without looking at other criteria suc...
详细信息
Selective thermal emitters can boost the efficiency of heat-to-electricity conversion in thermophotovoltaic systems only if their spectral selectivity is high. We demonstrate a non-Hermitian metasurface-based selectiv...
详细信息
暂无评论