1,226 research outputs found

    Ensemble Learning approach to Enhancing Binary Classification in Intrusion Detection System for Internet of Things

    Get PDF
    The Internet of Things (IoT) has experienced significant growth and plays a crucial role in daily activities. However, along with its development, IoT is very vulnerable to attacks and raises concerns for users. The Intrusion Detection System (IDS) operates efficiently to detect and identify suspicious activities within the network. The primary source of attacks originates from external sources, specifi-cally from the internet attempting to transmit data to the host network. IDS can identify unknown attacks from network traffic and has become one of the most effective network security. Classification is used to distinguish between normal class and attacks in binary classification problem. As a result, there is a rise in the false positive rates and a decrease in the detection accuracy during the model\u27s training. Based on the test results using the ensemble technique with the ensemble learning XGBoost and LightGBM algorithm, it can be concluded that both binary classification problems can be solved. The results using these ensemble learning algorithms on the ToN IoT Dataset, where binary classification has been performed by combining multiple devices into one, have demonstrated improved accuracy. Moreover, this ensemble approach ensures a more even distribution of accuracy across each device, surpassing the findings of previous research

    PROFILING LEARNING ACTIVITIES IN EXTENSIVE READING COURSE: A CASE OF INDONESIAN UNIVERSITY LEARNERS

    Get PDF
    Extensive Reading (hereafter, ER) has been discussed and deployed as a prevalent approach to enhance EFL/ESL learners’ reading skills in language classroom for several decades. However, insufficient attention has been devoted to the students’ learning activities in Extensive Reading course, notably in Indonesia. For this reason, this study accentuated on profiling the learning activities in Extensive Reading course in such a country. The data were collected through semi-structured interview and analysed with thematic analysis (Braun Clarke, 2006). The findings designated that the students performed two main learning activities in Extensive Reading course, namely inside and outside classroom activities. Viewed from inside classroom activities, they conducted classroom presentations to develop not only reading skills but also speaking skills, self-confidence and self-responsibilities. On the other hand, they selected and read literary works based on their interests and abilities, completed reading logs, created powerpoint slides, made a written reports, produced a poster for presentations and posted their works on their own blogs. Given these facts, ER learning activities enable the EFL/ESL learners to foster and sustain their reading strategies and become more strategic readers

    String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort

    Get PDF
    Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi such as campus, libraries, cafes, and others. IDS Snort can detect sniffing attacks (Arp Spoofing). String Matching Method KMP algorithm is applied to detect attacks on snort logging files to provide alerts (messages) to users. Tests carried out are black box testing to test application functionality, and accuracy testing. All application functionality was successful, and testing the accuracy of the match between manual calculations for string matching and accurate application

    Analisis Faktor Yang Mempengaruhi Tingkat Perubahan Nilai Effort Rate (ER) Pada Metode UCP Untuk Estimasi Effort Pengembangan Perangkat Lunak

    Get PDF
    Nilai Effort Rate (ER) adalah nilai yang dijadikan variabel untuk menghitung estimasi effort proyek pengembangan perangkat lunak pada metode use case point dengan satuan person-hours. Permasalahan yang timbul yaitu, belum adanya ketetapan berapakah nilai default dari ER yang sesuai untuk digunakan pada perhitungan estimasi effort, serta seringnya perubahan nilai ER yang terjadi lebih dari sekali. Dari beberapa penelitian yang terdahulu juga dapat disimpulkan bahwa terjadi ketidakkonsistenan dalam penentuan nilai ER. Maka, perlu dilakukan analisa faktorfaktor yang berpengaruh terhadap kejadian tersebut agar dapat diketahui penyebab perubahan dan besar pengaruhnya terhadap nilai ER. Metode yang digunakan antara lain: membuat dan menyebarkan kuesioner ke beberapa tim pengembang dengan kondisi satu responden mewakili satu proyek, terakhir melakukan analisa menggunakan teknik analisis dengan Structural Equation Model (SEM) yaitu generalized structured component analysis (GSCA) untuk menguji hipotesis faktor yang mempengaruhi tingkat perubahan nilai ER. ===================================================================================================== Effort Rate (ER) value is the value of the variable used to calculate the estimated effort software development projects on the use case point method with units of personhours. The problem that arise is, what is the default value of ER is appropriate to be used in the calculation of estimated effort, and the change frequency in ER value that occur more than once. From some previous research can also be inferred that inconsistency occurred in the determination of the ER value. Thus, the need for analysis of the influential factors of the incident in order toknow the cause of the change and its effect on the ER value. The methods used include: create and distribute questionnairse to several teams of developers with the condition one respondent represent one project, lastly, do the analysis using the analysis technique with SEM which is GSCA to test the hypothesis factors that affect the rate of change of the ER value

    Laguerre polynomials and the inverse Laplace transform using discrete data

    Get PDF
    We consider the problem of finding a function defined on (0,)(0,\infty) from a countable set of values of its Laplace transform. The problem is severely ill-posed. We shall use the expansion of the function in a series of Laguerre polynomials to convert the problem in an analytic interpolation problem. Then, using the coefficients of Lagrange polynomials we shall construct a stable approximation solution.Comment: 14 page

    Twice-daily intravenous bolus tacrolimus infusion for acute graft-vs-host disease prophylaxis

    Get PDF

    Pelatihan Penggunaan Aplikasi Zoom Untuk Pembelajaran Daring di MTs Muhammadiyah 02 Pekanbaru

    Get PDF
    With the COVID-19 pandemic, human activities have been disrupted, including the learning process in the education sector. The government issued a policy that learning is online. The online learning method requires to master the use of technology and it is still considered new by most teachers, that’s why this community service is carried out. This activity is intended for all teachers and teaching staff at MTs Muhammadiyah 02 Pekanbaru and Activities are carried out with three processes, namely preparation, implementation, and evaluation. The preparation stage is carried out by meeting with the school to determine the topic, schedule, and timing. The implementation stage is carried out by presenting and practicing the use of the Zoom application directly. The evaluation stage is carried out by helping to receive complaints about the use of applications from participants after the activity is carried out. The results of community service activity can increase the ability to use the Zoom application so that the online learning process becomes effective and maximized

    TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation

    Full text link
    Secure computation is of critical importance to not only the DoD, but across financial institutions, healthcare, and anywhere personally identifiable information (PII) is accessed. Traditional security techniques require data to be decrypted before performing any computation. When processed on untrusted systems the decrypted data is vulnerable to attacks to extract the sensitive information. To address these vulnerabilities Fully Homomorphic Encryption (FHE) keeps the data encrypted during computation and secures the results, even in these untrusted environments. However, FHE requires a significant amount of computation to perform equivalent unencrypted operations. To be useful, FHE must significantly close the computation gap (within 10x) to make encrypted processing practical. To accomplish this ambitious goal the TREBUCHET project is leading research and development in FHE processing hardware to accelerate deep computations on encrypted data, as part of the DARPA MTO Data Privacy for Virtual Environments (DPRIVE) program. We accelerate the major secure standardized FHE schemes (BGV, BFV, CKKS, FHEW, etc.) at >=128-bit security while integrating with the open-source PALISADE and OpenFHE libraries currently used in the DoD and in industry. We utilize a novel tile-based chip design with highly parallel ALUs optimized for vectorized 128b modulo arithmetic. The TREBUCHET coprocessor design provides a highly modular, flexible, and extensible FHE accelerator for easy reconfiguration, deployment, integration and application on other hardware form factors, such as System-on-Chip or alternate chip areas.Comment: 6 pages, 5figures, 2 table

    The Impact of a 4th Generation on Mixing and CP Violation in the Charm System

    Full text link
    We study D0-D0 mixing in the presence of a fourth generation of quarks. In particular, we calculate the size of the allowed CP violation which is found at the observable level well beyond anything possible with CKM dynamics. We calculate the semileptonic asymmetry a_SL and the mixing induced CP asymmetry eta_fS_f which are correlated with each other. We also investigate the correlation of eta_fS_f with a number of prominent observables in other mesonic systems like epsilon'/epsilon, Br(K_L -> pi0 nu nu), Br(K+ -> pi+ nu nu), Br(B_s ->mu+ mu-), Br(B_d -> mu+ mu-) and finally S_psi phi in the B_s system. We identify a clear pattern of flavour and CP violation predicted by the SM4 model: While simultaneous large 4G effects in the K and D systems are possible, accompanying large NP effects in the B_d system are disfavoured. However this behaviour is not as pronounced as found for the LHT and RSc models. In contrast to this, sizeable CP violating effects in the B_s system are possible unless extreme effects in eta_fS_f are found, and Br(B_s ->mu+ mu-) can be strongly enhanced regardless of the situation in the D system. We find that, on the other hand, S_psi phi > 0.2 combined with the measured epsilon'/epsilon significantly diminishes 4G effects within the D system.Comment: 22 pages, 23 figures, v2 (references added

    Bladder stones – red herring for resurgence of spasticity in a spinal cord injury patient with implantation of Medtronic Synchromed pump for intrathecal delivery of baclofen – a case report

    Get PDF
    BACKGROUND: Increased spasms in spinal cord injury (SCI) patients, whose spasticity was previously well controlled with intrathecal baclofen therapy, are due to (in order of frequency) drug tolerance, increased stimulus, low reservoir volume, catheter malfunction, disease progression, human error, and pump mechanical failure. We present a SCI patient, in whom bladder calculi acted as red herring for increased spasticity whereas the real cause was spontaneous extrusion of catheter from intrathecal space. CASE PRESENTATION: A 44-year-old male sustained a fracture of C5/6 and incomplete tetraplegia at C-8 level. Medtronic Synchromed pump for intrathecal baclofen therapy was implanted 13 months later to control severe spasticity. The tip of catheter was placed at T-10 level. The initial dose of baclofen was 300 micrograms/day of baclofen, administered by a simple continuous infusion. During a nine-month period, he required increasing doses of baclofen (875 micrograms/day) to control spasticity. X-ray of abdomen showed multiple radio opaque shadows in the region of urinary bladder. No malfunction of the pump was detected. Therefore, increased spasticity was attributed to bladder stones. Electrohydraulic lithotripsy of bladder stones was carried out successfully. Even after removal of bladder stones, this patient required further increases in the dose of intrathecal baclofen (950, 1050, 1200 and then 1300 micrograms/day). Careful evaluation of pump-catheter system revealed that the catheter had extruded spontaneously and was lying in the paraspinal space at L-4, where the catheter had been anchored before it entered the subarachnoid space. A new catheter was passed into the subarachnoid space and the tip of catheter was located at T-8 level. The dose of intrathecal baclofen was decreased to 300 micrograms/day. CONCLUSION: Vesical calculi acted as red herring for resurgence of spasticity. The real cause for increased spasms was spontaneous extrusion of whole length of catheter from subarachnoid space. Repeated bending forwards and straightening of torso for pressure relief and during transfers from wheel chair probably contributed to spontaneous extrusion of catheter from spinal canal in this patient
    corecore