<?xml version="1.0" encoding="UTF-8"?>
<itemContainer xmlns="http://omeka.org/schemas/omeka-xml/v5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://repository.horizon.ac.id/items/browse?collection=684&amp;output=omeka-xml&amp;sort_field=added" accessDate="2026-04-11T09:02:13+00:00">
  <miscellaneousContainer>
    <pagination>
      <pageNumber>1</pageNumber>
      <perPage>10</perPage>
      <totalResults>4</totalResults>
    </pagination>
  </miscellaneousContainer>
  <item itemId="9126" public="1" featured="1">
    <fileContainer>
      <file fileId="9150">
        <src>https://repository.horizon.ac.id/files/original/41e311750f8047a86d9584dbf1ac0128.pdf</src>
        <authentication>46c4b768c87492b2e2af2ee05dfc2eb1</authentication>
      </file>
    </fileContainer>
    <collection collectionId="684">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="98027">
                  <text>VOL. 12 NO 3 ( 2023 ) SEPTEMBER 2023</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98028">
                <text>Identification of Medical Mask Use by Applying the Convolutional Neural Network Algorithm and the Gabor Filter with Multiclass Classification</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98029">
                <text>convolutional neural network, gabor filter, medical mask classification, multiclass classification</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98030">
                <text>Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-COV-2) causes global pandemics and makes countries around the world lock down for tourists. This action is required to prevent the spread of viruses that take 14 days to disappear. SARS-COV-2 can easily infect individuals through a droplet. Thus, the governments of every country worldwide recommend wearing medical masks to prevent the spread of viruses, as well as maintaining distance during activities with others and washing hands frequently. Medical masks become efficient if their application is precise, owing to a lack of knowledge and self-awareness to preserve their distance and wash their hands. This paper proposes a Convolutional Neural Network (CNN) with Gabor filter implementation. The simulation uses a mask on a dataset with over 70,000 individual photos. The results demonstrated that the proposed CNN-Gabor model in this work could effectively classify the position of the mask when compared to the CNN model without the Gabor filter.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98031">
                <text>Muh Arifandi, Erik Iman Heri Ujianto</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="48">
            <name>Source</name>
            <description>A related resource from which the described resource is derived</description>
            <elementTextContainer>
              <elementText elementTextId="98032">
                <text>www.ijcit.com</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98033">
                <text>June 2023</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98034">
                <text>PERI IRAWAN</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="42">
            <name>Format</name>
            <description>The file format, physical medium, or dimensions of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98035">
                <text>PDF</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="44">
            <name>Language</name>
            <description>A language of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98036">
                <text>ENGLISH</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="51">
            <name>Type</name>
            <description>The nature or genre of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98037">
                <text>TEXT</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="9127" public="1" featured="1">
    <fileContainer>
      <file fileId="9151">
        <src>https://repository.horizon.ac.id/files/original/db28f6c3d6648877ee506880f92e07fa.pdf</src>
        <authentication>f078eeaedf83619c5db44a2648215c67</authentication>
      </file>
    </fileContainer>
    <collection collectionId="684">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="98027">
                  <text>VOL. 12 NO 3 ( 2023 ) SEPTEMBER 2023</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98038">
                <text>Fraud Detection in Motor Insurance Claims Using&#13;
Supervised Learning Techniques: A Review</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98039">
                <text>Insurance, Fraud, Class Imbalance, SMOTE, Feature Selection, Ensemble Learning</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98040">
                <text>Fraudulent claims have been a big drawback in motor insurance despite the insurance industry having vast amounts of motor claims data. Analyzing this data can lead to a more efficient way of detecting reported fraudulent claims. The challenge is how to extract insightful information and knowledge from this data and use it to model a fraud detection system. Due to constant evolution and dynamic nature of fraudsters, some approaches utilized by insurance firms, such as impromptu audits, whistle-blowing, staff rotation have become infeasible. Machine learning techniques can aid in fraud detection by training a&#13;
prediction model using historical data. The performance of the models is affected by class imbalance and the determination of the most relevant features that might lead to fraud detection from data. In this paper we examine various fraud detection techniques and compare their performance efficiency. We then give a summary of techniques’ strengths and weaknesses in identifying claims as either fraudulent or non-fraudulent, and finally propose a fraud detection framework of an ensemble model that is trained on dataset balanced using SMOTE and with relevant features only. This proposed approach would improve performance and reduce false positives.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98041">
                <text>David Gichohi Maina, Juliet Chebet Moso, Patrick Kinyua Gikunda</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="48">
            <name>Source</name>
            <description>A related resource from which the described resource is derived</description>
            <elementTextContainer>
              <elementText elementTextId="98042">
                <text>www.ijcit.com</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98043">
                <text>June 2023</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98044">
                <text>PERI IRAWAN</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="42">
            <name>Format</name>
            <description>The file format, physical medium, or dimensions of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98045">
                <text>PDF</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="44">
            <name>Language</name>
            <description>A language of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98046">
                <text>ENGLISH</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="51">
            <name>Type</name>
            <description>The nature or genre of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98047">
                <text>TEXT</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="9128" public="1" featured="1">
    <fileContainer>
      <file fileId="9152">
        <src>https://repository.horizon.ac.id/files/original/ee9ae5cd3a069bc2d37dba355ad7ce5b.pdf</src>
        <authentication>15d9b7b87bafed707f1ef92d97db1ed8</authentication>
      </file>
    </fileContainer>
    <collection collectionId="684">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="98027">
                  <text>VOL. 12 NO 3 ( 2023 ) SEPTEMBER 2023</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98048">
                <text>Fortifying Connectivity: A Hybrid Algorithm Approach for Augmented Security and Efficiency in Bluetooth Technology</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98049">
                <text>Bluetooth, Architecture, Related Work, Versions, Two fish algorithm, ElGamal Algorithm, Conclusion</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98050">
                <text>Bluetooth technology has become an integral part of our daily lives, providing wireless connectivity and seamless communication between wide ranges of devices. Bluetooth uses a master-slave architecture, where one device acts as the master, and the other devices act as slaves. The master device initiates and controls the connection, while the slave devices respond to connection requests from the master. In this research we are enhancing the security and efficiency of Bluetooth technology using hybrid approached algorithm i.e., combination of Two fish and ElGamal algorithm for making the communication process more secure and protected from foreign access. This research paper proposes a novel approach to enhance Bluetooth security by applying a hybrid algorithm that combines the strengths of Two fish and ElGamal encryption schemes. Two fish, a symmetric-key algorithm known for its high-speed data processing and resistance to attacks, will provide the foundation for encrypting data during Bluetooth communication. Concurrently, ElGamal, a public-key algorithm celebrated for its robust security and strong cryptographic properties, will complement the hybrid approach by ensuring secure key exchange between devices. The fusion of Two fish and ElGamal aims to overcome the limitations of using either algorithm in isolation, while capitalizing on their respective advantages to form a more potent and reliable security solution. By employing Two fish for efficient data encryption and ElGamal for secure key exchange, we anticipate a formidable defense against various attack vectors, including eavesdropping, man-in-the-middle attacks, and brute-force attempts.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98051">
                <text>Rashmi Sharma, Dr. Manish Shrivastava</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="48">
            <name>Source</name>
            <description>A related resource from which the described resource is derived</description>
            <elementTextContainer>
              <elementText elementTextId="98052">
                <text>www.ijcit.com</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98053">
                <text>June 2023</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98054">
                <text>PERI IRAWAN</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="42">
            <name>Format</name>
            <description>The file format, physical medium, or dimensions of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98055">
                <text>PDF</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="44">
            <name>Language</name>
            <description>A language of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98056">
                <text>ENGLISH</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="51">
            <name>Type</name>
            <description>The nature or genre of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98057">
                <text>TEXT</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="9129" public="1" featured="1">
    <fileContainer>
      <file fileId="9153">
        <src>https://repository.horizon.ac.id/files/original/698ebce2f738f9ff6f15a2a4cee9cc73.pdf</src>
        <authentication>e1a2be0f3aa11b37466d9f44a7dc17cb</authentication>
      </file>
    </fileContainer>
    <collection collectionId="684">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="98027">
                  <text>VOL. 12 NO 3 ( 2023 ) SEPTEMBER 2023</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98058">
                <text>A Biometric Authentication Scheme to Enhance Access Integrity of Higher Education Institutions</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98059">
                <text>Authentication, integrity, security, accuracy, attacks</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98060">
                <text>Access control and security within higher education institutions are of paramount importance in safeguarding sensitive information and resources. Conventional authentication methods, such as passwords and identification cards, have proven susceptible to security breaches and identity theft. To address these vulnerabilities, this paper presents a novel biometric authentication scheme tailored to the unique needs of higher education institutions. Deploying a trustworthy user authentication system became a key responsibility for both access control and securing user's private data with the rapid rise of electronic crimes and their connected difficulties. For both private and public use, human biometric features including voice, finger, iris scanning, face, signature, and other features offer a solid security level. This paper provides a comprehensive overview of the biometric authentication scheme, outlining its architecture, functionality, and security measures. We also present the results of a pilot implementation within a higher education institution, demonstrating improved access security and user satisfaction. Ethical considerations and privacy safeguards are discussed to ensure responsible biometric data handling. For a long time, numerous biometric authentication solutions have been considered. owing to the distinctiveness of human biometrics, which was important in thwarting imposters' attacks. Only a few of the key issues endangering system integrity and impeding effective service delivery include identity theft, spoofing, and the reliability of authentication systems in higher education institutions. From the experiment the total number of tests was 15, as the threshold was one attempt. While fingerprint authentication typically took 2.67 seconds, palm vein authentication often took 9.15 seconds. Therefore, the palm vein was slower than the fingerprint in terms of speed. The structure of the hand and the distance between the palm and the scanner were the determining elements in pal's slow authentication speed. The palm vein system has a 93.33% accuracy rate compared to the fingerprint system's 60% accuracy rate, making it the preferable model to use in a higher education setting. A biometric system's success or failure is influenced by a variety of variables and application domains. The purpose of this work is to discuss an appropriate biometric authentication model that may be used to improve the reliability of biometric systems in institutions of higher learning. The proposed biometric authentication scheme offers a forward-looking solution to the access integrity challenges faced by higher education institutions. By adopting this technology, institutions can bolster their security posture, protect sensitive data, and provide a more convenient and secure access experience for students, faculty, and staff.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98061">
                <text>Boniface Mwangi Wambui1,2, Thika, Kenya, Thika, Kenya</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="48">
            <name>Source</name>
            <description>A related resource from which the described resource is derived</description>
            <elementTextContainer>
              <elementText elementTextId="98062">
                <text>www.ijcit.com</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98063">
                <text>June 2023</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98064">
                <text>PERI IRAWAN</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="42">
            <name>Format</name>
            <description>The file format, physical medium, or dimensions of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98065">
                <text>PDF</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="44">
            <name>Language</name>
            <description>A language of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98066">
                <text>ENGLISH</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="51">
            <name>Type</name>
            <description>The nature or genre of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="98067">
                <text>TEXT</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
</itemContainer>
