Telkomnika (Telecommunication Computing Electronics and Control)最新文献

筛选
英文 中文
Evolutionary programming approach for securing medical images using genetic algorithm and standard deviation 利用遗传算法和标准偏差确保医学图像安全的进化编程方法
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-12-01 DOI: 10.12928/telkomnika.v21i6.25231
Shihab A. Shawkat, Najiba Tagougui, M. Kherallah
{"title":"Evolutionary programming approach for securing medical images using genetic algorithm and standard deviation","authors":"Shihab A. Shawkat, Najiba Tagougui, M. Kherallah","doi":"10.12928/telkomnika.v21i6.25231","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i6.25231","url":null,"abstract":"ABSTRACT","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"110 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-IoT supply chain: systematic literature review 区块链-物联网供应链:系统文献综述
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-30 DOI: 10.12928/telkomnika.v21i5.24699
Umi Nabilah Badrol Said, M. R. Baharon, M. Z. Mas'ud, Ariff Idris, Noor Azurati Ahmad Salleh
{"title":"Blockchain-IoT supply chain: systematic literature review","authors":"Umi Nabilah Badrol Said, M. R. Baharon, M. Z. Mas'ud, Ariff Idris, Noor Azurati Ahmad Salleh","doi":"10.12928/telkomnika.v21i5.24699","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24699","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45200029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amazon products reviews classification based on machine learning, deep learning methods and BERT 亚马逊产品评论基于机器学习、深度学习方法和BERT的分类
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-30 DOI: 10.12928/telkomnika.v21i5.24046
S. Iftikhar, Bandar Alluhaybi, M. Suliman, Ammar Saeed, Kiran Fatima
{"title":"Amazon products reviews classification based on machine learning, deep learning methods and BERT","authors":"S. Iftikhar, Bandar Alluhaybi, M. Suliman, Ammar Saeed, Kiran Fatima","doi":"10.12928/telkomnika.v21i5.24046","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24046","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45811039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive segmentation algorithm based on level set model in medical imaging 医学影像中基于水平集模型的自适应分割算法
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.22365
Boualem Mansouri, Abdelkader Khobzaoui, M. Damou, M. Chetioui, A. Boudkhil
{"title":"Adaptive segmentation algorithm based on level set model in medical imaging","authors":"Boualem Mansouri, Abdelkader Khobzaoui, M. Damou, M. Chetioui, A. Boudkhil","doi":"10.12928/telkomnika.v21i5.22365","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.22365","url":null,"abstract":",","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48246144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem 改进的基于身份的密码系统改进车载自组网入侵检测
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.22207
Zachaeus K. Adeyemo, Emmanuel B. Ajulo, Damilare O Akande, Hammed O. Lasisi, Samson I. Ojo
{"title":"Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem","authors":"Zachaeus K. Adeyemo, Emmanuel B. Ajulo, Damilare O Akande, Hammed O. Lasisi, Samson I. Ojo","doi":"10.12928/telkomnika.v21i5.22207","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.22207","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135063726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection system for imbalance ratio class using weighted XGBoost classifier 入侵检测系统采用加权XGBoost分类器进行失衡比分类
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.24735
Januar Al Amien, Hadhrami Ab Ghani, Nurul Izrin Md Saleh, Edi Ismanto, Rahmad Gunawan
{"title":"Intrusion detection system for imbalance ratio class using weighted XGBoost classifier","authors":"Januar Al Amien, Hadhrami Ab Ghani, Nurul Izrin Md Saleh, Edi Ismanto, Rahmad Gunawan","doi":"10.12928/telkomnika.v21i5.24735","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24735","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45422433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual model of internet banking adoption with perceived risk and trust factors 考虑感知风险和信任因素的网上银行采用的概念模型
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.24581
Waleed A. Hammood, Afrig Aminuddin, Omar A. Hammood, Khairul Hafezad Abdullah, Davi Sofyan, Majid Rahardi
{"title":"Conceptual model of internet banking adoption with perceived risk and trust factors","authors":"Waleed A. Hammood, Afrig Aminuddin, Omar A. Hammood, Khairul Hafezad Abdullah, Davi Sofyan, Majid Rahardi","doi":"10.12928/telkomnika.v21i5.24581","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24581","url":null,"abstract":"Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135063725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic channel selection using shuffled frog leaping algorithm for EEG based addiction detection 基于混合蛙跳算法的脑电成瘾检测通道自动选择
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.23172
Grace Mary Kanaga Edward, Angela Esther Rajakumar, K. Raimond, Anitha Jeevanayagam
{"title":"Automatic channel selection using shuffled frog leaping algorithm for EEG based addiction detection","authors":"Grace Mary Kanaga Edward, Angela Esther Rajakumar, K. Raimond, Anitha Jeevanayagam","doi":"10.12928/telkomnika.v21i5.23172","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.23172","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46679544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, simulation, and analysis of microstrip patch antenna for wireless applications operating at 3.6 GHz 3.6 GHz无线应用微带贴片天线的设计、仿真和分析
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.24813
Md. Sohel Rana, Tahasin Ahmed Fahim, Shuvashis Biswas Rana, Russel Mahbub, Md. Mostafizur Rahman
{"title":"Design, simulation, and analysis of microstrip patch antenna for wireless applications operating at 3.6 GHz","authors":"Md. Sohel Rana, Tahasin Ahmed Fahim, Shuvashis Biswas Rana, Russel Mahbub, Md. Mostafizur Rahman","doi":"10.12928/telkomnika.v21i5.24813","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24813","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49476707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of a LoRa-based system for warning of forest fire 基于lora的森林火灾预警系统的设计与实现
Telkomnika (Telecommunication Computing Electronics and Control) Pub Date : 2023-10-01 DOI: 10.12928/telkomnika.v21i5.24712
Tuyen Phong Truong, Quang Thien Tran, Phat Tan Le
{"title":"Design and implementation of a LoRa-based system for warning of forest fire","authors":"Tuyen Phong Truong, Quang Thien Tran, Phat Tan Le","doi":"10.12928/telkomnika.v21i5.24712","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24712","url":null,"abstract":"This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO 2 ) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135010331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信