Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–4 dari 4 artikel
Predicting First-Year Student Performance with SMOTE-Enhanced Stacking Ensemble and Association Rule Mining for University Success Profiling
Kikunda, Philippe Boribo
; Kasongo, Issa Tasho
; Nsabimana, Thierry
; Ndikumagenge, Jérémie
; Ndayisaba, Longin
; Mushengezi, Elie Zihindula
; Kala, Jules Raymond
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
This study examines the application of Educational Data Mining (EDM) to predict the academic per-formance of first-year students at the Catholic University of Bukavu and the Higher Institute of Edu-cation (ISP) in the Democratic Republic of Congo. The primary objective is to develop a model that can identify at-risk students early, providing the university with a tool to enhance student support and academic guidance. To address the challenges posed by data imbalance (where successful cases outnu...
Sumber Asli
Google Scholar
DOI
Explainable Bayesian Network Recommender for Personalized University Program Selection
Journal of Computing Theories and Applications
Vol 3
, No 1
(2025)
In a context where students face increasingly complex academic choices, this work proposes a recommendation system based on Bayesian networks to guide new baccalaureate holders in their university choices. Using a dataset containing variables such as secondary school section, gender, type of school, percentage obtained, age, and first-year honors, we have constructed a probabilistic model capturing the dependencies between these characteristics and the option chosen. The data is collected at the...
Sumber Asli
Google Scholar
DOI
A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification
Journal of Computing Theories and Applications
Vol 2
, No 3
(2025)
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, necessitating robust attack detection mechanisms. This study presents a comprehensive comparative analysis of ten supervised learning algorithms for IoT attack detection and classification, addressing the critical challenge of balancing detection accuracy with practical deployment constraints. Using the CICIoT2023 dataset, encompassing data from 105 IoT devices and 33 attack types, we evaluate N...
Sumber Asli
Google Scholar
DOI
A Comprehensive Approach to Protocols and Security in Internet of Things Technology
Journal of Computing Theories and Applications
Vol 2
, No 3
(2024)
The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. Th...
Sumber Asli
Google Scholar
DOI