24 research outputs found

    Sistem Rekomendasi Artikel Ilmiah Berbasis Web Menggunakan Content-based Learning dan Collaborative Filtering

    Get PDF
    Penelitian ini mengimplementasikan metode content-based learning dan collaborative filtering pada sistem rekomendasi artikel ilmiah berbasis web untuk merekomendasikan artikel ilmiah berbahasa Inggris. Sistem memiliki empat komponen, yaitu analisa konten, profile learner, komponen penyaringan, dan pengambilan dokumen. Content-based learning diimplementasikan pada komponen analisa konten yang bertugas mengidentifikasi masukan berupa artikel ilmiah berbahasa Inggris. Profile learner dilakukan untuk menghitung kemiripan antar pengguna setelah sistem mendapatkan feedback berupa rating dari pengguna. Collaborative filtering diimplementasikan pada komponen penyaringan yang bertugas untuk merekomendasikan artikel kepada pengguna setelah sistem mendapatkan hasil kemiripan antar pengguna.  Pengambilan dokumen dilakukan pada proses pengambilan artikel yang dicari oleh pengguna. Uji coba dilakukan pada 100 artikel ilmiah, 6 kelas kategori, serta melibatkan 35 pengguna. Hasil penelitian ini membuktikan bahwa implementasi metode content-based learning dan collaborative filtering pada sistem rekomendasi artikel ilmiah berbasis web mampu memberikan tingkat relevansi dan efektifitas sebesar 0.801 berdasarkan Mean Average Precision dan 0,851 berdasarkan Mean Absolute Error

    A patient agent controlled customized blockchain based framework for internet of things

    Get PDF
    Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.Doctor of Philosoph

    Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections

    Get PDF
    End-to-end verifiable election systems (E2E systems) provide a provably correct tally while maintaining the secrecy of each voter's ballot, even if the voter is complicit in demonstrating how they voted. Providing voter incoercibility is one of the main challenges of designing E2E systems, particularly in the case of internet voting. A second challenge is building deployable, human-voteable E2E systems that conform to election laws and conventions. This dissertation examines deployability, coercion-resistance, and their intersection in election systems. In the course of this study, we introduce three new election systems, (Scantegrity, Eperio, and Selections), report on two real-world elections using E2E systems (Punchscan and Scantegrity), and study incoercibility issues in one deployed system (Punchscan). In addition, we propose and study new practical primitives for random beacons, secret printing, and panic passwords. These are tools that can be used in an election to, respectively, generate publicly verifiable random numbers, distribute the printing of secrets between non-colluding printers, and to covertly signal duress during authentication. While developed to solve specific problems in deployable and incoercible E2E systems, these techniques may be of independent interest

    University of Wollongong Undergraduate Calendar 2003

    Get PDF

    University of Wollongong Undergraduate Calendar 2003

    Get PDF

    Science handbook

    Get PDF
    2004 handbook for the faculty of Scienc

    Science handbook

    Get PDF
    2004 handbook for the faculty of Scienc

    Science handbook

    Get PDF
    2004 handbook for the faculty of Scienc
    corecore