Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–7 dari 7 artikel
Integrating Quantum, Deep, and Classic Features with Attention-Guided AdaBoost for Medical Risk Prediction
Kusuma, Muh Galuh Surya Putra
; Setiadi, De Rosal Ignatius Moses
; Herowati, Wise
; Sutojo, T.
; Adi, Prajanto Wahyu
; Dutta, Pushan Kumar
; Nguyen, Minh T.
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
Chronic diseases such as chronic kidney disease (CKD), diabetes, and heart disease remain major causes of mortality worldwide, highlighting the need for accurate and interpretable diagnostic models. However, conventional machine learning methods often face challenges of limited generalization, feature redundancy, and class imbalance in medical datasets. This study proposes an integrated classification framework that unifies three complementary feature paradigms: classical tabular attributes, dee...
Sumber Asli
Google Scholar
DOI
Indoor Positioning using Smartphones: An Improved Time-of-Arrival Technique
Vu, Thang C.
; Nguyen, Trung H.
; Nguyen, Mui D.
; Nguyen, Dung T.
; Nguyen, Tao V.
; Dinh, Long Q.
; Nguyen, Minh T.
Journal of Computing Theories and Applications
Vol 3
, No 1
(2025)
Indoor positioning technology based on smartphones plays an important role in the current technological development context. Especially in applications such as warehouses, supermarkets, hospitals, or buildings. While the global positioning system (GNSS) is popular and effective outdoors, it has several limitations when operating in enclosed spaces, such as indoors, due to the complexity of these environments. Smartphones have many built-in sensors (such as light sensors, sound sensors, gyroscope...
Sumber Asli
Google Scholar
DOI
A Novel Clustering Solution Based on Energy Threshold for Energy Efficiency Purposes in Wireless Sensor Networks
Vu, Thang C.
; Do, Binh D.
; Nguyen, Mui D.
; Nguyen, Dung T.
; Nguyen, Tao V.
; Dinh, Long Q.
; Nguyen, Hung T.
; Nguyen, Minh T.
Journal of Computing Theories and Applications
Vol 3
, No 1
(2025)
In many wireless sensor network (WSN) applications, nodes are randomly deployed and self-organize into a wireless network to perform tasks. In practice, recharging the batteries of network nodes after deployment is often difficult. Network nodes often operate autonomously, so the main focus is on increasing the node lifetime. Data redundancy is another limitation that makes nodes inefficient. In most cases, densely deployed nodes in a monitoring area will have redundant data from neighboring nod...
Sumber Asli
Google Scholar
DOI
Comprehensive Review of Security Problems in Mobile Robotic Assistant Systems: Issues, Solutions, and Challenges
Journal of Computing Theories and Applications
Vol 2
, No 2
(2024)
Nowadays, robots in the modern world are playing an important and increasingly popular role. MRA (Mobile Robotic Assistant) is a type of mobile robot designed to support humans in many different fields, helping to improve efficiency and safety in daily activities, work, or medical treatment. The number of MRAs is increasing and diverse in function, in addition to the ability to collect and process data, MRAs also have the ability to physically interact with users. Therefore, security is one of t...
Sumber Asli
Google Scholar
DOI
A Comprehensive Study on Applications of Blockchain in Wireless Sensor Networks for Security Purposes
Nguyen, Mui Duc
; Nguyen, Minh Tuan
; Vu, Thang Chien
; Ta, Tien Minh
; Tran, Quang Anh
; Nguyen, Dung The
Journal of Computing Theories and Applications
Vol 2
, No 1
(2024)
The paper evaluates potential applications of blockchain technology in enhancing the security and reliability of Wireless Sensor Networks (WSNs). The existing vulnerabilities in WSNs, such as concerns regarding data integrity and security, demand innovative security solutions. Through systematic analysis, this paper provides valuable insights to expand understanding of WSNs security, explaining the feasibility and benefits of deploying blockchain technology. Possible attacks in the networks are...
Sumber Asli
Google Scholar
DOI
Solving the Green Economic Load Dispatch by Applying the Novel Meta-heuristic Algorithm
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
This study focuses on solving the green economic load dispatch problem by considering the presence of green energy sources, including wind energy and solar power plants. The main objective function of the whole study is to minimize the total fuel cost (TFC) of all the thermal generating sources (TGSs) in the system. Moreover, the multiple selection of all TGSs is also evaluated. Fire hawk optimization (FHO) and the Zebra optimization algorithm (ZOA) are applied to solve the problem of achieving...
Sumber Asli
Google Scholar
DOI
1 Sitasi
Electricity Generation Cost Optimization Based on Lagrange Function and Local Search
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
This paper proposes a method based on the Lagrange optimization function and local search technique for minimizing the total cost of two power systems. The first system comprises ten multiple fuel thermal units (MFTUs) while the second system combines the first system with renewable energies, solar and wind power. The proposed method has advantages over its conventional method without a local search technique, called the conventional Lagrange function-based method (CLM), such as having the same...
Sumber Asli
Google Scholar
DOI
4 Sitasi